2016 2nd International Conference on Science in Information Technology (ICSITech)

26-27 October 2016 Balikpapan,

COPYRIGHT AND REPRINT PERMISSION:

Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For reprint or republication permission, email to IEEE Copyrights Manager at pubs- [email protected]. All rights reserved. Copyright ©2016 by IEEE.

IEEE Catalog Number : CFP16B09-USB ISBN : 978-1-5090-1720-1

Editor : Andri Pranolo, Yana Hendriana, Adhi Prahara, Ahmad Azhari, Gunawan Ariyanto, Lala Septem Riza, Ramadiani, Anindita Septiarini, Hamdani, M. Syafrullah, Indra Riyanto, Krisna Adiyarta, Yaya Wihardi, Iwan Tri Riyadi Yanto, Aji Prasetya Wibawa, Oki Wicaksono, Harsa Wara P., Nataniel Dengen Publisher : IEEE Secretariat : Faculty of Information Technology and Communication, Universitas Mulawarman Jl. Barong Tongkok no.6 B29 Kampus UNMUL Gn. Kelua Sempaja, 75119, Kalimantan Timur, Indonesia

PROCEEDING

2016 2nd International Conference on Science in Information Technology (ICSITech)

“Information Science for Green Society and Environment”

26 - 27 October 2016 Balikpapan, Indonesia 2016 2nd International Conference on Science in Information Technology (ICSITech)

Foreword from Conference Chair

Welcome to the 2016 2nd International Conference on Science in Information Technology (ICSITech), held 26-27 October, 2016 at the Gran Senyiur Hotel, Balikpapan, – Indonesia. The conference is organized by the as a host, Universitas Pendidikan Indonesia, Universitas Ahmad Dahlan, UPN “Veteran” Yogyakarta, Universitas Muhammadiyah Surakarta, UTM Big Data Centre, Universiti Teknologi Malaysia, Universiti Putra Malaysia, Universiti Malaysia Sabah, and Universitas Budi Luhur. The conference is intended as a venue for presentation and discussion of research from both academia and industries, on a range of exciting and timely topics in information technology and computer science, computational intelligence based-on tropical rain forest, information system, data warehouse and related fields. This conference is IEEE conference so that papers accepted and presented will be forwarding for consideration to be published in the IEEE Xplore Digital Library. Thanks to Governor of East Kalimantan, Dr. H. Awang Farouk Ishak for coming and supporting this conference. Thanks are due to Keynote Speakers, Goutam Chakraborty (Professor, Dept. of Software & Information Science, Iwate Prefectural University, Japan). HeuiSeok Lim (Professor, Department of Computer Science and Engineering, College of Informatics, Korea University, Korea). Rayner Alfred (Assoc. Professor, Faculty of Computing and Informatics, Universiti Malaysia Sabah, Malaysia) and Rodziah Atan (Assoc. Professor, Faculty of Computer Science & Information Technology, Universiti Putra Malaysia, Malaysia). This year, the 2nd ICSITech conference received 119 papers submissions from 14 countries such as, Indonesia, China, Malaysia, the Philippines, Thailand, India, Korea, Egypt, Vietnam, Australia, Sri Lanka, UK, USA, and Colombia. But only 68 papers were accepted for presentations for oral sessions (the acceptance ratio is 57.14%). We are very grateful for the extensive efforts of many individuals who worked diligently to ensure a successful and high quality conference. We would like to thank to IEEE Indonesia Section, RistekDikti, TPC Committee and MULAWARMAN University for supporting this event. Once again we would like to say Welcome to Balikpapan for all. Congratulations for your papers have been accepted. We invite all participants to actively participate in the conference activities and the city tours, and to enjoy the opportunity to learn from one another. Thank you for choosing ICSITech as your conference reference. We hope to have your pleasant supports and participations in the next year 2017 3rd ICSITech at Universitas Pendidikan Indonesia, Bandung.

Thank you

General Chair Ramadiani, Ph.D. Faculty of Computer Science and Information Technology MULAWARMAN University, East Kalimantan - Indonesia 2016 2nd International Conference on Science in Information Technology (ICSITech)

Welcome Message from the Dean of CSIT Mulawarman University

I am very pleased and honored to have the opportunity to welcome you to the 2016 2nd International Conference on Science in Information Technology (ICSITech), which is hosted by Mulawarman University, under the assistance of the Ministry of Higher Education, with full support of the Faculty of Computer Science and Information Technology, Mulawarman University. As the Dean of Computer Science and Information Technology, I wish to extend a warm welcome to colleagues from the various countries. We are especially honored this year by the presence of Prof. Goutam Chakraborty, Prof. HeuiSeok Lim, Assoc. Prof. Rayner Alfred, and Assoc. Prof. Rodziah Atan, who has graciously accepted our invitation to be here as the Keynote Speakers. I recognize that these sessions are principally designed to enhance the exchange of knowledge and new discoveries in Computer Science and Information Technology, and related fields of applications. These annual gathering enable the building of a productive dialogue between participants of different nationalities. It also provide an invaluable opportunity for networking and fruitful contacts among international institutions. This is the second time that the conference is being held, this time with Mulawarman University as the host of the event. I am pleased to be informed that as many as 68 participants from 14 countries are in attendance. It is also our pleasure and honor to welcome the esteemed professors who are present to impart their expertise to the meeting. I would like to take this opportunity to express my gratitude to all delegates, IEEE, Ministry, government, and partners for their full support, cooperation and contribution to the ICSITech 2016. I also wish to express my gratitude to the Organizing Committee and the Scientific Committee for their diligence. The various sponsors are also thanked for their kind support.

Thank you.

Dean of Computer Science and Information Technology Mulawarman University Dr. Nataniel Dengen, M.Si.

2016 2nd International Conference on Science in Information Technology (ICSITech)

Welcome Message from the Rector of Mulawarman University

I am extremely proud and happy to welcome you to the 2016 2nd International Conference on Science in Information Technology (ICSITech) organized by MULAWARMAN University as a host, Universitas Pendidikan Indonesia (UPI), Universitas Ahmad Dahlan (UAD), UPN “Veteran” Yogyakarta, Universitas Muhammadiyah Surakarta (UMS), UTM Big Data Centre, Universiti Teknologi Malaysia (UTM), Universiti Putra Malaysia (UPM), Universiti Malaysia Sabah (UMS), and Universitas Budi Luhur (UBL). This conference is one of the most important events in MULAWARMAN University this year since MULAWARMAN University as one of the leading university in computer science, computational intelligence based-on tropical rain forest, information and technology feels the need to have a forum for the researchers, engineers and scientists to share knowledge. The development of computer science, computational intelligence based-on tropical rain forest, information and technology needs a media for researchers, engineers and scientists to share and expand the networking. We create this conference to serve the purpose as the media. It is also our hope that this conference will act as a motivation for researchers, engineers and scientists to publish their ideas and researchers in an international forum.

As it is MULAWARMAN’ vision to become a world class knowledge institution, research and knowledge sharing have become part of our core focus. Our actions which reflect pursue towards the mission are strongly encourage the collaboration nourishment between institutions. Therefore, I would like to send out sincere invitation to collaborate together with MULAWARMAN faculty members for your researches.

To the distinguished delegates from near and a far: I wish you a fruitful conference and an enjoyable stay. Again, welcome to the 2016 2ndInternational Conference on Science in Information Technology (ICSITech) and MULAWARMAN University.

Thank you

Rector of MULAWARMAN University Prof. Dr. H. Masjaya, M.Si.

2016 2nd International Conference on Science in Information Technology (ICSITech)

Welcome Speech by Governor of East Kalimantan

As Governor of East Kalimantan, I congratulate Mulawarman University as the host of the International conference on Science in Information technology in 2016 in Balikpapan, East Kalimantan. I am very proud, Kaltim had been a gathering place for researchers and academics in the field of IT from various regions in Indonesia and abroad. Achievement of East Kalimantan in terms of the development of IT tools and information disclosure have been implemented long time ago. By providing scholarships and sending human resources to attend IT school, so that Kaltim could prepare a reliable force in the IT field, and ready to realize Kaltim as a cyber province. East Kalimantan is the Indonesian province that strongly supports the disclosure. Since 2013, the East Kalimantan province has always ranked the top three in terms of information disclosure votes nationally until now. I always ask all parties in East Kalimantan to continue to oversee the process of public disclosure, particularly in East Kalimantan Provincial Government and SKPD. Due to the disclosure of information, the public can control the government in implementing development. Kaltim will continue intensively socialize, educate, and advocate for the community, especially public organizations in terms of public disclosure pursuant to Law No. 14 of 2008. Again I say, welcome to all the participants of the conference 2ndICSITech 2016 in Balikpapan, East Kalimantan. Hopefully, you can get to know Kaltim further and we can work together in the future.

Thank you

Governor of East Kalimantan Prof. Dr. H. Awang Faroek Ishak

2016 2nd International Conference on Science in Information Technology (ICSITech)

Opening Message

From IEEE Indonesia Section Chair, to be addressed in the 2016 2nd International Conference on Science in Information Technology (ICSITech).

Dear colleagues, Professors, researchers, ICT professionals, ladies and gentlemen, good morning.

On behalf of IEEE Indonesia section, I would like to express my sincere gratitude and welcome you to the 2016 2nd International Conference on Science in Information Technology (ICSITech), that has been approved by IEEE for Technical co-sponsorship with conference record number #38412.

This conference is quite significant with the current situation in Indonesia, as well as Asia and Pacific Region, especially of the current development and innovation in the advanced of research area on Science in Information Technology, as well as providing an engaging forum for participants to share knowledge and expertise in related issues, because currently the development of ICT infrastructure is one of the most growing infrastructures in this area.

This is related to the Indonesia ICT Development Target in National Midterm Plan 2015 – 2019, and also related to Nawacita strategies, that Indonesia has ambitious plans and strategies to accelerate the economic development through ICT infrastructures.

Currently the Indonesia government is also forming a National Team, consist of four Working Groups related to the 5G future development in Indonesia, and consist of Working Group Research and Technology, Working Group Industrial Relation, Working Group Regulation and Working Group Social Implication of Technology.

Ladies and gentlemen, The three major global internet technology companies such as Microsoft, Google and Facebook are trying to approach with quite different technology, to enabling Internet for All last-mile connectivity in the developing countries such as Indonesia. Google is researching a solution called Project Loon. Facebook is experimenting with solar powered drones. And Microsoft is researching the use of TV whitespaces, IEEE 802.22, wireless regional area network.

Indonesia marks the fourth country behind Brazil, New Zealand, and Australia in which Loon fly its balloons more than 12 miles in the sky to beam down internet access, to any LTE-capable smartphone and devices.

Ladies and gentlemen, If we refer to the World Bank, technological progress is a considerable driving force behind economic growth, citizen engagement and job creation of the country.

Information and communication technologies, in particular, are reshaping many aspects of the world’s economies, governments and societies. In developing countries, public officials, businesses and citizens are working together to harness the transformative power of ICTs to make services more efficient, catalyze economic development and strengthen social networks.

2016 2nd International Conference on Science in Information Technology (ICSITech)

Based on ITU, currently there are more than 7 billion mobile cellular subscriptions worldwide, corresponding to a penetration rate of 97%. In Indonesia currently have about 250 million mobile cellular subscriptions, with penetration rate about 105%. Currently, 4G network has been broadly implemented in several cities in Indonesia.

Mobile broadband penetration worldwide reaches 47% in 2015, a value that increased 12 times since 2007 and in Indonesia reaches 37%, about 88 million people using internet in 2015.

The development of wireless communication towards 5G Technology and Internet of things, are also highly expected to become an active supporters, contributors and participants in the future digital business, information and social activities. In year 2020, there are expected about 30 billion devices enabled to interact and communicate among themselves, exchanging data and information, senses about their environment, with the possibility to react autonomously to the real and physical world and influencing it by running processes with or without direct human intervention.

Ladies and gentlemen, IEEE Indonesia Section has been 28 years has activities in Indonesia, in terms of collaboration, IEEE Indonesia section has a good and mutual relationship with ICT organizations, Industries, Universities as well as the government in Indonesia. IEEE Indonesia also participated in the preparation of forming several new regulations related to the ICT in Indonesia, such as Near Field Communications (NFC), Short Range Device (SRD), Broadband Wireless Access (BWA), TV Digital Terrestrial, Internet Transaction Electronics (ITE), Over The Top OTT and also related to 5G regulation.

IEEE Indonesia Section has contributed about 30 different International conferences in the ICT sector annually, and I do hope in the near future some high quality conferences such as this APCC event, will be continued and strengthened, so the result will give more benefit and positive impact to the human being, especially to Indonesian people.

Ladies and gentlemen, Currently we are aware that the way the world works is changing, from resource based economy where things are shared or traded, to the knowledge economy, where we can share knowledge and information almost freely to improve our lives. If everyone had access to basic information and tools, then everyone would benefit from the creativity, innovation and ideas that everyone embodies.

Technology drives innovation, people can do more, do better. Technology drives higher quality of life, people can live better.

Finally, we do hope all of you will have enjoyable and valuable experience. During this 2 days conference, you may share your best knowledge in your area of research and professional activities.

Thank you. Balikpapan, 26 October 2015.

Satriyo Dharmanto IEEE Indonesia Section Chair 2016 2nd International Conference on Science in Information Technology (ICSITech)

Organizers and Sponsors

Organized by

Universitas Mulawarman, Indonesia (as a host) Universitas Ahmad Dahlan, Indonesia Universitas Pendidikan Indonesia, Indonesia UTM Big Data Centre, Universiti Teknologi Malaysia, Malaysia UPN “Veteran” Yogyakarta, Indonesia Universiti Putra Malaysia, Malaysia Universitas Muhammadiyah Surakarta, Indonesia Universitas Malaysia Sabah, Malaysia Universitas Budi Luhur, Jakarta, Indonesia

Technical Co-Sponsored by

IEEE Indonesia Section

Funded by

Ministry of Research, Technology, and Higher Education (RISTEKDIKTI), Republic of Indonesia

Supported by

Goverment of East Kalimantan, Indonesia Mayor of Balikpapan, Indonesia PT. Qwords International Company

2016 2nd International Conference on Science in Information Technology (ICSITech)

2016 2nd ICSITech Committee

Steering Committee - Dwi Hendratmo Widyantoro (Institut Teknologi Bandung, Indonesia) - Satriyo Dharmanto (IEEE Indonesia Section) - Shi-Jinn Horng (National Taiwan University Science and Technology, Taiwan) - Siti Mariyam Shamsuddin (Universiti Teknologi Malaysia) - Tutut Herawan (University of Malaya, Malaysia)

Organizing Committee

Executive Board - Masjaya (Rector of Universitas Mulawarman, Indonesia) - Nataniel Dengen (Dean of CSIT, Universitas Mulawarman, Indonesia)

General Chair - Ramadiani (Universitas Mulawarman, Indonesia)

General Co-Chair - Arda Yunianta (Universitas Mulawarman, Indonesia) - Haviluddin (Universitas Mulawarman, Indonesia)

Secretary - Hamdani (Universitas Mulawarman, Indonesia) - Dewi Pramudi Ismi (Universitas Ahmad Dahlan, Indonesia) - Oki Wicaksono (Universitas Mulawarman, Indonesia) - Rofilde Hasudungan (Universitas Mulawarman, Indonesia)

Treasury - Joan Angelina (Universitas Mulawarman, Indonesia) - Yana Hendriana (IEEE Member, Universitas Ahmad Dahlan, Indonesia)

Marketing and Public Relation - Anindita Septiarini (Universitas Mulawaman, Indonesia) - Chatchada Kaewpruksapimon (Suan Dusit Rajabhat University, Thailand) - Dyna Marisa Khairina (Universitas Mulawarman, Indonesia) - Heliza Rahmania Hatta (Universitas Mulawarman, Indonesia) - Hidayatullah Himawan (UPN Veteran, Yogyakarta, Indonesia) - Intan Ermahani A Jalil (Universiti Teknikal Malaysia Melaka) - Mahmoud Ali Ahmed (Khartoum University, Sudan) - Rasim (Universitas Pendidikan Indonesia, Bandung, Indonesia) - Rosdiyana Binti Samad (Universiti Malaysia Pahang) - Ridwan Suhud (Lembaga Ilmu Pengetahuan Indonesia) - Septya Maharani (Universitas Mulawarman, Indonesia) 2016 2nd International Conference on Science in Information Technology (ICSITech)

- Wahyudin (Universitas Pendidikan Indonesia, Bandung, Indonesia)

Publication - Andri Pranolo (Universitas Ahmad Dahlan, Indonesia) - Shafaatunnur Hasan (Universiti Teknologi Malaysia)

Technical Program Committee

General - Lala Septem Riza (Unversitas Pendidikan Indonesia, Indonesia) - Andri Pranolo (IEEE Member, Universitas Ahmad Dahlan, Indonesia) - Anton Yudhana (Universitas Ahmad Dahlan, Indonesia) - Arda Yunianta (Universitas Mulawarman, Indonesia) - Krisna Adiyarta (Universitas Budi Luhur, Indonesia) - Iwan Tri Riyadi Yanto (Universitas Ahmad Dahlan, Indonesia)

Technical - Mohammad Syafrullah (Universitas Budi Luhur, Indonesia) - Adhi Prahara (Universitas Ahmad Dahlan, Indonesia) - Agus Sasmito Aribowo (UPN Veteran Yogyakarta, Indonesia) - Dewi Pramudi Ismi (Universitas Ahmad Dahlan, Indonesia) - Gunawan Ariyanto (Universitas Muhammadiyah Surakarta, Indonesia) - Harsa Wara (Universitas Pendidikan Indonesia, Bandung, Indonesia) - Herlina Jayadianti (UPN Veteran Yogyakarta, Indonesia) - Yaya Wihardi (Universitas Pendidikan Indonesia, Bandung, Indonesia) - Yudi Wibisono (Universitas Pendidikan Indonesia, Bandung, Indonesia )

Sponsor - Eddy Prasetyo Nugroho (Universitas Pendidikan Indonesia, Bandung, Indonesia) - Nur Rochmah Dyah P (Unversitas Ahmad Dahlan, Indonesia) - Sri Winiarti (Unversitas Ahmad Dahlan, Indonesia) - Wawan Setiawan (Universitas Pendidikan Indonesia, Bandung, Indonesia) - Zainal Arifin (Universitas Mulawarman, Indonesia) 2016 2nd International Conference on Science in Information Technology (ICSITech)

2016 2nd ICSITech Reviewer

- Abderrafiaa Koukam (Université de Technologie de Belfort-Montbéliard (UTBM), France) - Ag Asri Ag Ibrahim (Universiti Malaysia Sabah, Malaysia) - Agus Harjoko (Universitas Gadjah Mada, Indonesia) - Aji Prasetya Wibawa (Universitas Negeri Malang, Indonesia) - Anca Ralescu (University of Cincinnati Ohio, USA) - Anhar Risnumawan (Politeknik Elektronika Negeri Surabaya, Indonesia) - Anton Satria Prabuwono (King Abdulaziz University, Saudi Arabia) - Arda Yunianta (Universitas Mulawarman, Indonesia) - Awang Pratomo (UPN Veteran Yogyakarta, Indonesia) - Azhari SN (Universitas Gadjah Mada, Indonesia) - Azuraliza Abu Bakar (Universiti Kebangsaan Malaysia) - Bana Handaga (Universitas Muhammadiyah Surakarta, Indonesia) - Chin Kim On (Universiti Malaysia Sabah, Malaysia) - Danial Hooshyar (Korea University, Korea) - Deris Stiawan (Faculty of Computer Science, Sriwijaya University, Indonesia) - Dewi Octaviani (Universiti Teknologi Malaysia) - Didi Rosiyadi (Research Center for Informatics LIPI, Indonesia) - Edi Kurniawan (Research Center for Informatics LIPI, Indonesia) - Eko Aribowo (Universitas Ahmad Dahlan, Indonesia) - Esa Prakasa (Research Center for Informatics LIPI, Indonesia) - Fajar Suryawan (Universitas Muhammadiyah Surakarta, Indonesia) - Ford Lumban Gaol (IEEE Indonesia Section) - Gunawan Ariyanto (Universitas Muhammadiyah Surakarta, Indonesia) - Habib Shah (Universiti Tun Husain Onn Malaysia) - Hamzah Bin Ahmad (Universiti Malaysia Pahang) - Hanung Adi Nugroho (Universitas Gadjah Mada, Indonesia) - Heru Supriyono (Universitas Muhammadiyah Surakarta, Indonesia) - Herlina Jayadianti (Universitas Pembangunan Nasional Veteran Yogyakarta, Indonesia) - Hidayah Rahmalan (Universiti Teknikal Malaysia Melaka, Malaysia) - Husni Thamrin (Universitas Muhammadiyah Surakarta, Indonesia) - Igi Ardiyanto (Universitas Gadjah Mada, Indonesia) - Indra Riyanto (Universitas Budi Luhur, Jakarta, Indonesia) - Ito Wasito (Universitas Indonesia) - Iwan Tri Riyadi Yanto (Universitas Ahmad Dahlan, Indonesia) - I Wayan Mustika (IEEE Indonesia Section) - Jazi Istiyanto (Universitas Gadjah Mada, Indonesia) - Kamarul Hawari Bin Ghazali (Universiti Malaysia Pahang) - Keng-Yap Ng (Universiti Putra Malaysia, Malaysia) - Khabib Mustofa (Universitas Gadjah Mada, Indonesia) - Lala Septem Riza (Universitas Pendidikan Indonesia) 2016 2nd International Conference on Science in Information Technology (ICSITech)

- Lau Hui Keng (Universiti Malaysia Sabah, Malaysia) - Lian Duan (New Jersey Institute of Technology, USA) - Maizatul Akmar Ismail (University of Malaya, Malaysia) - Marzanah binti A. Jabar (University Putra Malaysia, Malaysia) - Mar Yah Said (Universiti Putra Malaysia, Malaysia) - Masayu Leylia Khodra (Institut Teknologi Bandung, Indonesia) - Masrah Azrifah Azmi Murad (University Putra Malaysia, Malaysia) - Mohd Hanafi Ahmad Hijazi (Universiti Malaysia Sabah, Malaysia) - Mohd Shahizan Bin Othman (Universiti Teknologi Malaysia) - Moslem Yousefi (Korea University, Korea) - Mohammad Syafrullah (Universitas Budi Luhur, Jakarta, Indonesia) - Munir (Universitas Pendidikan Indonesia, Bandung, Indonesia) - Mustafa Kaiiali (Mevlana University, Turkey) - Nataniel Dengen (Universitas Mulawarman, Indonesia) - Nazri Nawi (Universiti Tun Hussein Onn Malaysia) - Nita Solehati (Chonbuk National University, Republic of Korea) - Nurgiyatna (Universitas Muhammadiyah Surakarta, Indonesia) - Norhayati Mohd Ali (Universiti Putra Malaysia, Malaysia) - Norhalina Senan (Universiti Tun Husain Onn Malaysia) - Nor Fazlida Mohd Sani (Universiti Putra Malaysia, Malaysia) - Noor Aida Husaini (Universiti Tun Hussein Onn Malaysia) - Noraini Ibrahim (Universiti Tun Husain Onn Malaysia) - Noraini Che Pa (Universiti Putra Malaysia, Malaysia) - Noel Lopes (Polytechnic of Guarda, Portugal) - Omar Al Jadaan (Medical and Health Sciences University, United Arab Emirates) - Omid Motlagh (Commonwealth Scientific and Industrial Research Organization, Australia) - Ouri Wolfson (University of Illinois, USA) - Paulus Insap Santosa (Universitas Gadjah Mada, Indonesia) - Per Johan Runeson (Systems Lund University, Sweden) - Prima Vitasari Hj. Purwadi (Universiti Malaysia Pahang, Malaysia) - Raden Bagus Fajriya Hakim (Universitas Islam Indonesia, Indonesia) - Rafah Mohamed Almuttairi (University of Babylon, Iraq) - Rafał Dreżewski (AGH University of Science and Technology, Poland) - Ramadiani (Universitas Mulawarman, Indonesia) - Rayner Alfred (Universiti Malaysia Sabah, Malaysia) - Reza Pulungan (Universitas Gadjah Mada, Indonesia) - Rinaldi Munir (Institut Teknologi Bandung, Indonesia) - Riyanarto Sarno (Institut Teknologi Sepuluh Nopember (ITS), Indonesia) - Rusli Abdullah (Universiti Putra Malaysia) - Rodina binti Ahmad (University of Malaya, Malaysia) - Rodziah Atan (Universiti Putra Malaysia) - Ronny Mardiyanto (Institut Teknologi Sepuluh Nopember (ITS), Indonesia) - Rusydi Umar (Universitas Ahmad Dahlan, Indonesia) 2016 2nd International Conference on Science in Information Technology (ICSITech)

- Sa'adah Hassan (Universiti Putra Malaysia, Malaysia) - Sarina Sulaiman (Universiti Teknologi Malaysia) - Salfarina binti Abdullah (University Putra Malaysia, Malaysia) - Shaik Shakeel Ahamad (K.G. Reddy College of Engineering and Technology, Hyderabad, India) - Shafaatunnur Hasan (Universiti Teknologi Malaysia, Malaysia) - Shi-Jinn Horng (National University Sains and Technology, Taiwan) - Siti Mariyam Shamsuddin (Universiti Teknologi Malaysia) - Siti Sophiayati Yuhaniz (Universiti Teknologi Malaysia) - Slamet Riyadi (Universitas Muhammadiyah Yogyakarta, Indonesia) - Songhoua Xu (New Jersey Institute of Technology, USA) - Sri Kusumadewi (UII, Indonesia) - Sultan Noman Qasem (Taiz University, Arab Saudi) - Sunardi (Universitas Ahmad Dahlan, Indonesia) - Sunu Wibirama (Universitas Gadjah Mada, Indonesia) - Teguh Bharata Adji (Universitas Gadjah Mada, Indonesia) - Teo Susnjak (Massey University, New Zealand) - Tony Dwi Susanto (Institut Teknologi Sepuluh Nopember (ITS), Indonesia) - Ummi Rabaah Hashim (Universiti Teknikal Malaysia Melaka) - Vimala Balakrishnan (University of Malaya, Malaysia) - Wan Nurhayati Wan Ab Rahman (Universiti Putra Malaysia, Malaysia) - Waleed Ali Ahmed Abdullah (King Abdul Aziz University, Arab Saudi) - Wendi Usino (Universitas Budi Luhur, Jakarta, Indonesia) - Younes Saadi (University Tun Hussein Onn Malaysia, Malaysia) - Yusmadi Yah Jusoh (Universiti Putra Malaysia, Malaysia) - Zuwairie Bin Ibrahim (Universiti Malaysia Pahang)

2016 2nd International Conference on Science in Information Technology (ICSITech)

2016 2nd ICSITech Schedule

Day 1: Wednesday, October 26th, 2016

07:00 – 07:30 Registration – Room: Grand Ballroom (2nd Floor)

07:30 – 08:15 Opening Ceremony – Room: Grand Ballroom (2nd Floor) 07:30 – 07:45 Pre-Opening Session Welcome Messages: 1. 07:45 – 07:50 ICSITech 2016 Chairman: Ramadiani, Ph.D. 2. 07:50 – 07:55 Dean of CSIT UNMUL : Dr. Nataniel Dengen, M.Si. 3. 07:55 – 08:05 Rector of UNMUL : Prof. Dr. H. Masjaya, M.Si 4. 08:05 – 08:15 IEEE Indonesia Section : Satriyo Dharmanto

08:15 – 08:45 Invited Speech by Awang Faroek Ishak (Professor, Governor East Kalimantan, Indonesia)

08:45 – 09:00 Coffee Break I – Room: Grand Ballroom (2nd Floor)

09:00 – 10:40 Keynote Speech Session 1 – Room: Grand Ballroom (2nd Floor) Moderator : Dr. Ummi Rabaah Hashim

Time-Series Data Analysis – A few case studies with Bio-signals by Goutam Chakraborty (Professor, Intelligent Informatics Lab., Faculty of Software & Information Science, Iwate Prefectural University, Japan)

The Rise of Machine Learning to Unlock the Power of Big Data by Rayner Alfred (Assoc. Professor, Faculty of Computing and Informatics, Universiti Malaysia Sabah, Malaysia)

10:40 – 12:00 Parallel Class Session I-A : Informatics Track – Room : Grand Ballroom (2nd Floor) Moderator : Dr. Mohammad Syafrullah

10:40 – 11:00 (1570305408) Vehicle Detection and Tracking Based on Corner and Lines Adjacent Detection Features M.D. Enjat Munajat (Institute of Technology Bandung, Indonesia), Dwi H. Widyantoro (Institute of Technology Bandung, Indonesia), Rinaldi Munir (Institute of Technology Bandung, Indonesia)

11:00 – 11:20 (1570308101) Car Detection Based on Road Direction on Traffic Surveillance Image Adhi Prahara (Universitas Ahmad Dahlan, Indonesia), Murinto (Universitas Ahmad Dahlan, Indonesia)

11:20 – 11:40 (1570307547) Dataset Feature Reduction Using Independent Component Analysis with Contrast Function of Particle Swarm Optimization on Hyperspectral Image Classification 2016 2nd International Conference on Science in Information Technology (ICSITech)

Murinto (Universitas Gadjah Mada, Indonesia), Agus Harjoko (Universitas Gadjah Mada, Indonesia)

11:40 – 12:00 (1570307646) Comparison of Two Different Types of Morphological Method for Feature Extraction of Retinal Vessels in Colour Fundus Images Hanung Adi Nugroho (Universitas Gadjah Mada, Indonesia), Tri Lestari (Universitas Gadjah Mada, Indonesia), Rezty Amalia Aras (Universitas Gadjah Mada, Indonesia), Igi Ardiyanto (Universitas Gadjah Mada, Indonesia)

10:40 – 12:00 Parallel Class Session I-B : Informatics Track – Room : VIP CP I (1st Floor) Moderator : Dr. Aji Prasetya Wibawa

10:40 – 11:00 (1570286251) Implementation of Moving Average and Soft Computing Algorithm to Support Planting Season Calendar Forecasting System on Mobile Device Fhira Nhita (Telkom University, Indonesia), Deni Saepudin (Telkom University, Indonesia), Danang Triantoro (Telkom University, Indonesia), Adiwijaya (Telkom University, Indonesia), Untari Novia Wisesty (Telkom University, Indonesia)

11:00 – 11:20 (1570297470) Agile Person Identification Through Personality Test and kNN Classification Technique Rintaspon Bhannarai (Chiang Mai University, Thailand), Chartchai Doungsaard (Chiang Mai University, Thailand)

11:20 – 11:40 (1570295341) The use of Triple Exponential Smoothing Method (Winter) in Forecasting Passenger of PT Kereta Api Indonesia with Optimization Alpha, Beta, and Gamma Parameters Wawan Setiawan (Indonesia University of Education, Indonesia), Enjun Juniati (Indonesia University of Education, Indonesia), Ida Parida (Indonesia University of Education, Indonesia)

11:40 – 12:00 (1570306457) Comparison of SARIMA, NARX and BPNN Models in Forecasting Time Series Data of Network Traffic Haviluddin (Mulawarman University, Indonesia), Nataniel Dengen (Mulawarman University, Indonesia)

10:40 – 12:00 Parallel Class Session I-C : Informatics Track – Room : Lamaru Meeting Room (1st Floor) Moderator : Dr. Lala Septem Riza

10:40 – 11:00 (1570275378) Application of The Modified EzStego Algorithm for Hiding Secret Messages in The Animated GIF Images Rinaldi Munir (Institut Teknologi Bandung, Indonesia)

11:00 – 11:20 (1570294628) SMS Authentication Code Generated by Advance Encryption Standard (AES) 256 bits Modification Algorithm and One Time Password (OTP) to Activate New Applicant Account Eddy Prasetyo Nugroho (Indonesia University of Education, Indonesia), Rizky Rahman J. P. (Indonesia University of Education, Indonesia), Judhie Putra (Indonesia University of Education, Indonesia), Iman Muhamad Ramadhan (Indonesia University of Education, Indonesia)

2016 2nd International Conference on Science in Information Technology (ICSITech)

11:20 – 11:40 (1570305026) Privacy and Security of Sharing Referral Medical Record for Health Care System Mike Yuliana (Electronic Engineering Polytechnic Institute of Surabaya, Indonesia), Haryadi Amran Darwito (Electronic Engineering Polytechnic Institute of Surabaya, Indonesia), Amang Sudarsono (Electronic Engineering Polytechnic Institute of Surabaya, Indonesia), Gabymars Yofie (Electronic Engineering Polytechnic Institute of Surabaya, Indonesia)

11:40 – 12:00 (1570279688) Distributed infrastructure for efficient Management of Network Services. Case: Large Company in mining sector in Colombia Leonel Hernández (Institucion Universitaria – ITSA, Colombia)

10:40 – 12:00 Parallel Class Session I-D : Informatics Track – Room : VIP CP II A (1st Floor) Moderator : Dr. Krisna Adiyarta

10:40 – 11:00 (1570307546) Designing an Intelligent UI/UX System Based on the Cognitive Response for Smart Senior You-Dong Yun (KOREA University, Korea), Chanhee Lee (KOREA University, Korea), Heui-Seok Lim (KOREA University, Korea)

11:00 – 11:20 (1570285026) Response Models for Series of Commands in Gaming Environment Ida Bagus Kerthyayana Manuaba (Bina Nusantara University, Indonesia)

11:20 – 11:40 (1570250672) Virtual Player of Melodic Abstraction Instruments for Automatic Gamelan Orchestra Khafiizh Hastuti (Dian Nuswantoro University, Indonesia), A. Zainul Fanani (Dian Nuswantoro University, Indonesia), Arry Maulana Syarif (Dian Nuswantoro University, Indonesia)

11:40 – 12:00 (1570293169) Location And Time Based Reminder System On Android Mobile Device Nur Rokhman (Gadjah Mada University, Indonesia), Lubab Saifuddin (Gadjah Mada University, Indonesia)

10:40 – 12:00 Parallel Class Session I-E : Information System Track – Room : VIP CP II B (1st Floor) Moderator : Dr. Rusydi Umar

10:40 – 11:00 (1570244188) Path Analysis Method to Identify Factors Affecting Consumer Interest on Online Shopping Ratna Purwaningsih (University of Diponegoro, Indonesia), Belan Adison (University of Diponegoro, Indonesia)

11:00 – 11:20 (1570251888) Critical Success Factors for the Internet Technology Adoption by SMEs and Its Impact for The Performance Aries Susanty (Diponegoro University, Indonesia), Diana Puspita Sari (Diponegoro University, Indonesia), Debby Anastasia (Diponegoro University, Indonesia)

11:20 – 11:40 (1570284754) Antecedents of the Adoption of Online Games Technologies:The Study of Adolescent Behavior in Playing Online Games Bernardinus Harnadi (Soegijapranata Catholic University, Indonesia)

2016 2nd International Conference on Science in Information Technology (ICSITech)

11:40 – 12:00 (1570286598) The Determinants Affecting E-Loyalty: Hospitality Industry in Indonesia Viany Utami Tjhin (Bina Nusantara University, Indonesia), Reza Tavakoli (Bina Nusantara University, Indonesia), Shofwatunnikma (Bina Nusantara University, Indonesia), Robertus Nugroho Perwiro Atmojo (Bina Nusantara University, Indonesia)

10:40 – 12:00 Parallel Class Session I-F : Information System Track – Room : Meratus Board Room (1st Floor) Moderator : Dr. Ramadiani

10:40 – 11:00 (1570285340) Thai Text Topic Modeling System for Discovering Group Interests of Facebook Young Adult Users Rachsuda Jiamthapthaksin (Assumption University, Thailand)

11:00 – 11:20 (1570307472) A Proposed Method for Predicting US Presidential Election by Analyzing Sentiment in Social Media Andy Januar Wicaksono (Universitas Atma Jaya Yogyakarta, Indonesia), Suyoto (Universitas Atma Jaya Yogyakarta, Indonesia), Pranowo (Universitas Atma Jaya Yogyakarta, Indonesia)

11:20 – 11:40 (1570308121) The Assessment of Hospitality and Tourism SMEs Awareness on the Use of Mobile Technology and Internet Services – A Case Study of Hotel Businesses in Thailand Sakuna Anuvareepong (Assumption University, Thailand)

11:40 – 12:00 (1570308596) Bias Aware Lexicon-Based Sentiment Analysis of Malay Dialect on Social Media Data: A Study on The Sabah Language Mohd Hanafi Ahmad Hijazi (Universiti Malaysia Sabah, Malaysia), Lyndia Libin (Universiti Malaysia Sabah, Malaysia), Rayner Alfred (Universiti Malaysia Sabah, Malaysia), Frans Coenen (University of Liverpool, United Kingdom)

12:00 – 13:00 Lunch Break – Room : Ballroom (4th Floor)

13:00 – 14:50 Keynote Speech Session 2 Moderator : Dr. Aji Prasetya Wibawa

Introduction to an Intelligent UI/UX for aging people by HeuiSeok Lim (Professor, Department of Computer Science and Engineering, College of Informatics,Korea University, Kore)

Enhancing Service Quality Through Servive Level Agreement (SLA) Full Implementation by Rodziah Atan (Assoc. Professor, Faculty of Computer Science & Information Technology, Universiti Putra Malaysia, Malaysia)

14:50 – 15:10 Coffee Break

15:10 – 17:30 Parallel Class Session II-A : Informatics Track – Room : Grand Ballroom (2nd Floor) Moderator : Dr. Mohammad Syafrullah 2016 2nd International Conference on Science in Information Technology (ICSITech)

15:10 – 15:30 (1570284736) A New Framework for Measuring Volume of Axisymmetric Food Products using Computer Vision System Based on Cubic Spline Interpolation Joko Siswantoro (Universitas Surabaya, Indonesia), Endah Asmawati (Universitas Surabaya, Indonesia)

15:30 – 15:50 (1570308741) Segmentation of Optic Disc on Retinal Fundus Images Using Morphological Reconstruction Enhancement and Active Contour Hanung Adi Nugroho (Universitas Gadjah Mada, Indonesia), Ilcham (Universitas Gadjah Mada, Indonesia), Abdul Jalil (Universitas Gadjah Mada, Indonesia), Igi Ardiyanto (Universitas Gadjah Mada, Indonesia)

15:50 – 16:10 (1570241804) Marker-Based Tracking Using Temporal Coherence in Computer Facial Animation System Samuel Gandang Gunanto (Institut Teknologi Sepuluh Nopember Surabaya, Indonesia), Mochamad Hariadi (Institut Teknologi Sepuluh Nopember Surabaya, Indonesia), Eko Mulyanto Yuniarno (Institut Teknologi Sepuluh Nopember Surabaya, Indonesia)

16:10 – 16:30 (1570293628) Smart Poster Implementation on Mobile Bulletin System using NFC Tags and Salt Tokenization Case Study: Universitas Multimedia Nusantara Audy (Universitas Multimedia Nusantara, Indonesia), Marcel Bonar Kristanda (Universitas Multimedia Nusantara, Indonesia), Seng Hansun (Universitas Multimedia Nusantara, Indonesia)

16:30 – 16:50 (1570294442) Automated Tool for the Calculation of Cognitive Complexity of a Software Dinuka Rukshani Wijendra (Sri Lanka Institute of Information Technology, Sri Lanka), Kamalanath Priyantha Hewagamage (University of Colombo School of Computing, Sri Lanka)

16:50 – 17:10 (1570294495) Implementation of the Cellular Automata Algorithm for Developing an Educational Game Nurul Fauzia (Universitas Pendidikan Indonesia, Indonesia), Dedi Rohendi (Universitas Pendidikan Indonesia, Indonesia), Lala Septem Riza (Universitas Pendidikan Indonesia, Indonesia)

17:10 – 17:30 (1570295120) UCPabc as an Integration Model for Software Cost Estimation Renny Sari Dewi (Universitas Internasional Semen Indonesia, Indonesia), Grandys Frieska Prassida (Universitas Internasional Semen Indonesia, Indonesia), Sholiq (Institut Teknologi Sepuluh Nopember, Indonesia), Apol Pribadi Subriadi (Institut Teknologi Sepuluh Nopember, Indonesia)

15:10 – 17:50 Parallel Class Session II-B : Informatics Track – Room : VIP CP I (1st Floor) Moderator : Prof. Dr. Munir

15:10 – 15:30 (1570308794) A New Approach on Prediction of Fever Disease by Using a Combination of Dempster Shafer and Naïve Bayes Yani Mulyani (Universitas Pendidikan Indonesia, Indonesia), Eka Fitrajaya Rahman (Universitas Pendidikan Indonesia, Indonesia), Herbert (Universitas Pendidikan Indonesia, Indonesia), and Lala Septem Riza (Universitas Pendidikan Indonesia, Indonesia)

2016 2nd International Conference on Science in Information Technology (ICSITech)

15:30 – 15:50 (1570305265) Implementation of Medical Error Prevention System for Hypertension Disease Based on Fuzzy Reni Soelistijorini (Electronic Engineering Polytechnic Institute of Surabaya, Indonesia), Mike Yuliana (Electronic Engineering Polytechnic Institute of Surabaya, Indonesia), Ira Prasetyaningrum (Electronic Engineering Polytechnic Institute of Surabaya, Indonesia), Lina Pratiwi (Electronic Engineering Polytechnic Institute of Surabaya, Indonesia)

15:50 – 16:10 (1570295233) Integrated ANN And Bidirectional Improved PSO for Optimization of Fertilizer Doze On Palawija Plants Imam Cholissodin (University of Brawijaya, Indonesia), Candra Dewi (University of Brawijaya, Indonesia), Eunike Endariahna Surbakti (University of Brawijaya, Indonesia)

16:10 – 16:30 (1570241505) Classification Method of Multi-class on C4.5 Algorithm for Fish Diseases Sucipto (STMIK Amikom Yogyakarta, Indonesia), Kusrini (STMIK Amikom Yogyakarta, Indonesia), Emha Luthfi Taufiq (STMIK Amikom Yogyakarta, Indonesia)

16:30 – 16:50 (1570286055) Model Assessment of Land Suitability Decision Making for Oil Palm Plantation Hamdani (Mulawarman University, Indonesia), Anindita Septiarini (Mulawarman University, Indonesia), Dyna Marisa Khairina (Mulawarman University, Indonesia)

16:50 – 17:10 (1570260619) A System to Diagnose Learning Disability in Children of Special Need Munir (Universitas Pendidikan Indonesia, Indonesia), Rasim (Universitas Pendidikan Indonesia, Indonesia), Chepy Cahyadi (Universitas Pendidikan Indonesia, Indonesia), Lala Septem Riza (Universitas Pendidikan Indonesia, Indonesia)

17:10 – 17:30 (1570291952) Web Based Fuzzy Expert System For Lung Cancer Diagnosis Rodiah (Gunadarma University, Indonesia), Emy Haryatmi (Gunadarma University, Indonesia), Fitrianingsih (Gunadarma University, Indonesia), Herio Susanto (Gunadarma University, Indonesia)

15:10 – 17:50 Parallel Class Session II-C : Informatics Track – Room : Lamaru Meeting Room (1st Floor) Moderator : Dr. Ummi Rabaah Hashim

15:10 – 15:30 (1570283964) Cloud Computing Sensitive Data Protection using Multi Layered Approach Haifaa Jassim Muhasin (University Putra Malaysia, Malaysia), Rodziah Atan (University Putra Malaysia, Malaysia), Marzanah binti A.Jabar (University Putra Malaysia, Malaysia), Salfarina binti Abdullah (University Putra Malaysia, Malaysia)

2016 2nd International Conference on Science in Information Technology (ICSITech)

15:30 – 15:50 (1570305703) Wireless Communication with Batching Method Based on Xbee- PRO S2B Module for Sensing of Wind Speed Nurul Hiron (Siliwangi University, Indonesia), Asep Andang (Siliwangi University, Indonesia)

15:50 – 16:10 (1570307947) Dynamic Bandwidth Management Based on Traffic Prediction Using Deep Long Short Term Memory Tjeng Wawan Cenggoro (Bina Nusantara University, Indonesia), Ida Siahaan (Bina Nusantara University, Indonesia)

16:10 – 16:30 (1570258159) Energy Efficient Opportunistic Routing Algorithm for Underwater Sensor Network: A Review Mohd Murtadha Mohamad (Universiti Teknologi Malaysia, Malaysia), Mohammad Taghi Kheirabadi (Islamic Azad University, Iran)

16:30 – 16:50 (1570288850) Development of Instrumentation, Control and Navigation (ICON) for ATGM (Anti Tank Guided Missile) Herma Yudhi Irwanto (Indonesian National Institute of Aeronautics and Space, Rocket Technology Center, Indonesia)

16:50 – 17:10 (1570304813) Investigations of PV Balancer Architectures on Practical Solar Photo Voltaic System Dokala Udaykiran (V R Siddhartha Engineering College, India), P.V.R.L. Narasimham (V R Siddhartha Engineering College, India), N. Gouthamkumar (V R Siddhartha Engineering College, India), Darisi Sudheerkumar (V R Siddhartha Engineering College, India)

17:10 – 17:30 (1570305927) A Wireless Sensor Networks Localization using Geometric Triangulation Scheme for Object Tracking in Urban Search and Rescue Application Prima Kristalina (Politeknik Elektronika Negeri Surabaya (PENS), Indonesia), Aries Pratiarso (Politeknik Elektronika Negeri Surabaya (PENS), Indonesia), Tessy Badriyah (Politeknik Elektronika Negeri Surabaya (PENS), Indonesia), Erik Dwi Putro (Politeknik Elektronika Negeri Surabaya (PENS), Indonesia)

17:30 – 17:50 (1570285604) Profile of a typical mobile SMS user in emergency situations (empirical study in an urban flood prone area) Dinar Mutiara Kusumo Nugraheni (Flinders University, Australia, Diponegoro University, Indonesia), Denise de Vries (Flinders University, Australia)

15:10 – 17:30 Parallel Class Session II-D : Informatics Track – Room : VIP CP II A (1st Floor) Moderator : Dr. Krisna Adiyarta

15:10 – 15:30 (1570303586) Knowledge of Extraction from Trained Neural Network by Using Decision Tree Soleh Ardiansyah (Kalimantan Institute of Technology, Indonesia), Mazlina Abdul Majid (Universiti Malaysia Pahang, Malaysia), Jasni Mohamad Zain (Universiti Malaysia Pahang, Malaysia)

15:30 – 15:50 (1570306281) A Framework of Fuzzy Partition Based on Artificial Bee Colony for Categorical Data Clustering Iwan Tri Riyadi Yanto (Universitas Ahmad Dahlan, Indonesia), Younes Saadi (University of Malaya, Malaysia), Dedy Hartama (Tunas Bangsa AMIK and STIKOM, Indonesia), Dewi Pramudi Ismi (Universitas Ahmad Dahlan, Indonesia), Andri Pranolo (Universitas Ahmad Dahlan, Indonesia) 2016 2nd International Conference on Science in Information Technology (ICSITech)

15:50 – 16:10 (1570307816) Enhancing Modified Cuckoo Search Algorithm by using MCMC Random Walk Noor Aida Husaini (Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia), Rozaida Ghazali (Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia), Iwan Tri Riyadi Yanto (Universitas Ahmad Dahlan, Indonesia)

16:10 – 16:30 (1570308074) Modelling of Network Traffic Usage Using Self-Organizing Maps Techniques Haviluddin (Mulawarman University, Indonesia), Hendra Yuni Irawan (SMK Negeri 7 Samarinda, Indonesia), Achmad Fanany Onnilita Gaffar (State Polytechnic of Samarinda, Indonesia), Arda Yunianta (Mulawarman University, Indonesia), Awang Harsa Kridalaksana (Mulawarman University, Indonesia), Zainal Arifin (Mulawarman University, Indonesia), Mulaab Mulyo (Trunojoyo University, Indonesia), Andri Pranolo (Universitas Ahmad Dahlan, Indonesia), Bayu Kresnapati (Mulawarman University, Indonesia), Fauzi Rahman (Mulawarman University, Indonesia)

16:30 – 16:50 (1570308081) Soft Maximal Association rule for web user mining Iwan Tri Riyadi Yanto (Ahmad Dahlan University, Indonesia), Arif Rahman (Ahmad Dahlan University, Indonesia), Youes Saaadi (University of Malaya, Malaysia)

16:50 – 17:10 (1570285611) Parallelized GA-PSO Algorithm for Solving Job Shop Scheduling Problem Paulus Mudjihartono (Assumption University, Thailand, Universitas Atma Jaya Yogyakarta, Indonesia), Rachsuda Jiamthapthaksin (Assumption University, Thailand), Thitipong Tanprasert (Assumption University, Thailand)

17:10 – 17:30 (1570286325) State-of-the-Art Vietnamese Word Segmentation Song Nguyen Duc Cong (Assumption University, Bangkok, Thailand), Quoc Hung Ngo (University of Information Technology, Ho Chi Minh City, Vietnam), Rachsuda (Assumption University, Bangkok, Thailand)

15:10 – 17:50 Parallel Class Session II-E : Information System Track – Room : VIP CP II B (1st Floor) Moderator : Dr. Rusydi Umar

15:10 – 15:30 (1570240800) Innovation and practice in the teaching of digital media technology major Song Jinyu (Zhejiang Sci-Tech University, China), Zhang Xinyu (Zhejiang Sci-Tech University, China)

15:30 – 15:50 (1570293662) User Difficulties in E-Learning System Ramadiani (University of Mulawarman, Indonesia), Rodziah binti Atan (Universiti Putra Malaysia, Malaysia), Mohd. Hasan Selamat (Universiti Putra Malaysia, Malaysia), Rusli Abdullah (Universiti Putra Malaysia, Malaysia), Noraini Che Pa (Universiti Putra Malaysia, Malaysia), Azainil (University of Mulawarman, Indonesia)

15:50 – 16:10 (1570308055) Enhancing E-Learning System to Support Learning Style Based Personalization 2016 2nd International Conference on Science in Information Technology (ICSITech)

Kusuma Ayu Laksitowening (Telkom University, Indonesia), Amarilis Putri Yanuarifiani (Telkom University, Indonesia), Yanuar Firdaus Arie Wibowo (Telkom University, Indonesia)

16:10 – 16:30 (1570265788) Push Notification System to Mobile Game Player Using Distributed Event-Based System Approach Fiona Yunisa (Bina Nusantara University, Indonesia), Suharijto (Bina Nusantara University, Indonesia)

16:30 – 16:50 (1570307558) A Survey On Data-Driven Approaches In Educational Games Danial Hooshyar (Korea University, South Korea), Chanhee Lee (Korea University, South Korea), Heuiseok Lim (Korea University, South Korea)

16:50 – 17:10 (1570286443) Game Play Analytics to Measure the Effect of Marketing on Mobile Free-To-Play Games Tuang Dheandhanoo (Thammasat University, Thailand), Sittichai Theppaitoon (GAMEINDY Co., Ltd., Thailand), Pisal Setthawong (Assumption University, Thailand)

17:10 – 17:30 (1570244610) An Empirical Evaluation of ERP Values Using RBV Approach in Indonesia Dwi Hastuti (University of Lambung Mangkurat, Indonesia), Juhriyansyah Dalle (University of Lambung Mangkurat, Indonesia), Husnul Khatimi (University of Lambung Mangkurat, Indonesia)

15:10 – 17:50 Parallel Class Session II-F : Information System Track – Room : Meratus Board Room (1st Floor) Moderator : Dr. Fahrul Agus

15:10 – 15:30 (1570307907) Certificate Policy and Certification Practice Statement for Root CA Indonesia Arfive Gandhi (Universitas Indonesia, Indonesia), Yudho Giri Sucahyo (Universitas Indonesia, Indonesia), Tomi Sirait (Universitas Indonesia, Indonesia)

15:30 – 15:50 (1570241891) IT Governance and Business Alignment in Support of a Divestment Strategy Annamaré Wolmarans (University of Pretoria, South Africa), Neels Kruger (University of Pretoria, South Africa), Neil Croft (University of Pretoria, South Africa)

15:50 – 16:10 (1570307147) E-Gov Readiness Assessment To Determine E-Government Maturity Phase Aji Supriyanto (Gadjah Mada University, Indonesia), Khabib Mustofa (Gadjah Mada University, Indonesia)

16:10 – 16:30 (1570308006) Automatic Generation of Content Security Policy to Mitigate Cross Site Scripting Samer Attallah Mhana (Universiti Putra Malaysia, Malaysia), Jamilah Binti Din (Universiti Putra Malaysia, Malaysia), Rodziah Binti Atan (Universiti Putra Malaysia, Malaysia)

16:30 – 16:50 (1570295022) The Effect Of Task Technology Fit Toward Individual Performance On The Generation X (1956-1980) Using Information Technology 2016 2nd International Conference on Science in Information Technology (ICSITech)

Putut Pamilih Widagdo (Mulawarman University, Indonesia), Ramadiani (Mulawarman University, Indonesia), Tony Dwi Susanto (Institute of Technology Ten November, Indonesia)

16:50 – 17:10 (1570295470) PLAKDA - An IoT Platform for the Production of Mekong Basin Styled Fermented Fish (Plara) Tuul Triyason (King Mongkut’s University of Technology, Thailand), Pisal Setthawong (Assumption University, Thailand)

17:10 – 17:30 (1570295659) Big Data Properties Designed for Customer Engagement Information via Multi-Channel Digital Services Panant Krairojananan (Assumption University, Thailand), Sakuna Anuvareepong (Assumption University, Thailand)

17:30 – 17:50 (1570307651) Measuring Quality of Service for Mobile Internet Services Edy Budiman (Universitas Mulawarman, Indonesia), Oki Wicaksono (Universitas Mulawarman, Indonesia)

17:50 – 19:00 Break

19:00 – 20:30 Gala Dinner

20:30 – 21:30 Closing Ceremony 1. Welcome speech by Governor of East Kalimantan 2. Welcome speech by Rector of Mulawarman University 3. Best Paper Award 4. Memorandum of Understanding Signing Ceremony 5. Invitation to 2017 3rd ICSITech by Rector of Universitas Pendidikan Indonesia 6. Miscellaneous Information 7. Closing

Day 2: Thursday, October 27th, 2016

08:00 – 16.00 City Tour

2016 2nd International Conference on Science in Information Technology (ICSITech)

Keynote Speakers Biography

Goutam Chakraborty, Ph.D. (Professor, Intelligent Informatics Lab., Faculty of Software and Information Science, Iwate Prefectural University, Japan)

Prof. Goutam Chakraborty received his Ph.D. in 1993 from Tohoku University, Japan. Before joining Tohoku University, he worked in Telecommunication Industry in India. Presently he is Professor and head of the Intelligent Informatics laboratory, Department of the Software and Information Science, Iwate Prefectural University, Japan. His research interests are Soft Computing algorithms and their applications to solve pattern recognition, prediction, scheduling and optimization problems including applications in wired and wireless Networks. Recently, he is interested in the analysis of various time-series signals, collected by sensors from Human body as well as machines.

Rayner Alfred (Assoc. Prof., Faculty of Computing and Informatics, Universiti Malaysia Sabah, Malaysia)

Assoc. Prof. Dr. Rayner Alfred was born in Kota Kinabalu, Sabah, Malaysia. He completed a PhD in 2008 looking at intelligent techniques to model and optimize the complex, dynamic and distributed processes of knowledge discovery for structured and unstructured data. He holds a PhD degree in Computer Science from York University (United Kingdom), a Master degree in Computer Science from Western Michigan University, Kalamazoo (USA) and a Computer Science degree from Polytechnic University of Brooklyn, New York (USA). He leads and defines projects around knowledge discovery and information retrieval at Universiti Malaysia Sabah. One focus of Assoc. Prof. Dr. Rayner’s work is to build smarter mechanism that enables knowledge discovery in relational databases. His work addresses the challenges related to big data problem: How can we create and apply smarter collaborative knowledge discovery technologies that cope with the big data problem. He has authored and co-authored more than 75 journals/book chapters and conference papers, editorials, and served on the program and organizing committees of numerous national and international conferences and workshops. He is a Chief-Editor of International Journal of Computing and Informatics (IJCANDI). He is a member of the Institute of Electrical and Electronic Engineers (IEEE) and Association for Computing Machinery (ACM) societies.

Heuiseok Lim (Professor, Department of Computer Science and Engineering, Korea University, Korea)

Prof. Heuiseok Lim received his B.S., M.S. and Ph.D. degrees in Computer Science from Korea University, Seoul, in 1992, 1994 and 1997, respectively. He worked at SITEC of Samsung for two years after his PhD. He is a Professor in the Department of Computer Science and Engineering at Korea University in Korea. In 2012 year, He was a visiting scholar in the department of Computer Science of University of Colorado at Boulder. Now, he has been a 2016 2nd International Conference on Science in Information Technology (ICSITech) member of ACL and many other research groups. His research interests are in brain-neuro language processing, natural language processing, AI in education, and educational data mining.

Rodziah binti Atan (Assoc. Prof., Department of Software Engineering and Information Systems, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Malaysia and Laboratory of Halal Policy and Management, Halal Products Research Institute, Universiti Putra Malaysia, Malaysia)

Associate Professor Dr. Rodziah binti Atan is currently an academician at Faculty of Computer Science and Information Technology, and the Head of Lab to the Halal Policy and Management Laboratory, Halal Products Research Institute, Universiti Putra Malaysia. She specializes in the area of Software Engineering, Software process Modelling and Cloud Computing Services. Her current interest is on service level management monitoring and enforcement, and halal- related systems and technologies. She obtained her PHD in Software Engineering from Universiti Putra Malaysia in 2005. Lecturing and handling classes to more than 1000 undergraduate students and has had 8 PhDs and 8 Masters students graduated under her supervision. She also has published academic books, chapter in books, more than 100 journal publications and conference papers. She also has been appointed as keynote speaker for international conferences, colloquium invited speaker, panel assessor in academic workshop, subject matter expert, local and international journal and conference reviewer. 2016 2nd International Conference on Science in Information Technology (ICSITech)

[Plenary Speaker]

Time-Series Data Analysis – A Few Case Studies with Bio-Signals

Goutam Chakraborty, Ph.D.

Professor, Intelligent Informatics Lab. Faculty of Software and Information Science, Iwate Prefectural University, JAPAN

A dynamic system is represented by its outputs, as time-series data. Modeling of the time-series is an important data-mining task for prediction in future, or detection of deviation from normal behavior (anomaly). Clustering of multiple time-series leads to understanding the system, as well as improve efficiency of monitoring.

Detecting change in time-series data from normality will lead to various applications. A time- series data may have several kinds of anomalies. Depending on the target application, and based on the domain knowledge, we need to define what is normal and what is not. In this talk, we consider two bio-signals, ECG and EEG. The types of signals are different, one periodic and the other not. The applications are different too, ECG to monitor heart-health, and EEG for BCI application.

Part I - Anomaly Detection with ECG: We proposed algorithm to detect anomalies in a periodic time-series data, where anomaly is a sub‒sequence having a distance more than threshold from normal one. We use ECG data, which is nearly periodic. The approach is from signal point of view, not from medical perception. Though ECG signal is periodic, a closer look will reveal that the period differs slightly at every cycle. Anomalies are those subsequences of a longer time series that are maximally different from all the rest of the subsequences of the whole sequence. Anomalies could be detected by comparing every pair of subsequences. But, in this method, if subsequence have a little different length of period than fundamental period, the distance registered is large even though there is no anomaly. The duration, and intensity of the subsequences do change dynamically, though they are normal. Direct comparison, taking care of this duration variance is computationally heavy. We propose a computationally light discord detection algorithm by introducing a new concept, we named mother signal. We got a high detection rate using real ECG data.

Part II - Efficient BCI Speller by Clustering EEG: In this work, multi-channel EEG signals are clustered to find the minimum number of probes that could deliver the highest identification rate. This is a multi-objective (MO) problem, as we need to minimize the number of probes but maximize recognition rate. Agglomerative Clustering was used, followed by multi-objective genetic algorithm (MOGA).

Keywords: time-series, bio-signals, EEG, ECG, clustering, data analysis

2016 2nd International Conference on Science in Information Technology (ICSITech)

[Plenary Speaker]

The Rise of Machine Learning for Big Data Analytics

Rayner Alfred

Faculty of Computing and Informatics Universiti Malaysia Sabah, Malaysia

This paper addresses the rise of machine learning for big data analytics. First, machine learning and several terms related to machine learning are defined and explained in details and these terms include artificial intelligence, data mining, data science, data analytics and knowledge discovery, statistics and Business Intelligence. These definitions will show how these terms are inter-related to each other. Then, the definition of big data is outlined based on three terms: Volume, Velocity and Variety. Implementing a good big data strategy is very crucial in order to guarantee the success of applying machine learning for learning big data. As a result, the trending in Big Data is also illustrated and defined based on the landscape of big data; Infrastructure, Analytics, Applications, Cross-Infrastructures/Analytics, Open Sources, Data Sources and API, Incubators and Schools. This paper also addresses some of the open source facilities that are available for public in order to ensure that large scale of machine learning application can be realized. Finally, in conclusion, the big trend over the last few months in Big Data analytics has been the increasing focus on artificial intelligence to help analyze massive amounts of data and derive predictive insights. AI/machine learning is now precipitating a trend towards the emergence of the application layer of Big Data. The combination of Big Data and AI will drive incredible innovation across pretty much every industry. From that perspective, the Big Data opportunity is probably even bigger than people thought.

Keywords : machine learning, big data, data analytics, artificial intelligence, data science, data mining.

2016 2nd International Conference on Science in Information Technology (ICSITech)

[Plenary Speaker]

Introduction to an Intelligent UI/UX for Aging People

Heuiseok Lim

Department of Computer Science and Engineering Korea University, Korea

Everyday we are using a wide variety of smart devices and they have become indispensable to us. They play important roles as cognitive amplification tools. Cognitive amplification ability is especially vital for elderly people. Elderly people are likely to forget things easily, and smart devices can amplify their memory. Elders are likely to spend more time watching dramas and movies than younger people, and elderly people deserve more from smart devices than what is provided today.

However, due to biological aging, looking at a small screen and touching just the right places to operate smart devices is getting more and more difficult. When seniors realize that they can hardly read characters and listen to sound normally, they feel very embarrassed and stressed. After several trials with disappointment, they may decide not to use smart devices and gradually become separated from younger people and society as a whole.

This phenomenon is called the digital divide between the young and old generation. The digital divide is very problematic since it not only separates people, but makes them lonely and uninformed of social issues. Such digital divides can be caused by poor design of user interface and experience. Most current UI/UX are not designed with elderly people in mind.

But, what if UI/UX can be adaptable to users according to their biological characteristics and behaviors?

In this talk, I will introduce a recently started development project for intelligent UI/UX models, especially those tailored towards elderly people. The intelligent UI/UX model can change the UI and UX according to the user’s cognitive ability and his or her behavior patterns. The model consists of three main modules: user module, contents module, and behavior module. I will explain each module in details. Finally, I will speak about recent achievements and the future plan.

Keywords: UI/UX, intelligent, model, biological, characteristic, behavior.

2016 2nd International Conference on Science in Information Technology (ICSITech)

[Plenary Speaker]

Enhancing Service Quality through Service Level Agreement (SLA) Full Implementation

Rodziah binti Atan1,2

1Department of Software Engineering and Information Systems, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, 43400 Serdang, Selangor, MALAYSIA

2Laboratory of Halal Policy and Management, Halal Products Research Institute, Universiti Putra Malaysia, 43400 Serdang, Selangor, MALAYSIA

Various SLA monitoring systems are proposed by different features and abilities to evaluate the agreed SLA. The current SLA monitoring systems in cloud computing for its structural, behavioral characteristics and situation are also in place. The systematic reviews of a well- known methods and approaches shows a significant numbers of researches been done in this area. Based on the number of effort and researches, the quality of services should proportionately increase alongside them. We look this matter from the perspectives of enforcement, that evident the stand of quality of services. Service Level Agreement (SLA) enforcement impact measures is a potential research area to be explored. Assumptions that this study is making are, SLA management will become better by a firm enforcement, where every customers are responsible to launch report of bugs or mischief of services such as unsatisfactory quality or service unavailability to a collection pool, and the provider will react immediately to the complaints so that the total downtime not exceeding the SLA value, with efficient enforcement. This study establishes fundamental theory to measure enforcement impact to SLA monitoring and management. We proposed eight activity phases from formulating until analyzing and decision formation. Descriptive statistics is utilized to analyze the extracted data. The SLA validation detection is the most frequent purpose of SLA monitoring systems in cloud by 58% and throughput is checked as an attribute target by 28%. The self-monitoring SLA, self-healing system, hierarchical structure are recognized points of SLA monitoring systems which need improvement before the enforcement could be based upon.

Keywords: Service Level Agreement, enforcement, monitoring, cloud computing, quality of service

2016 2nd International Conference on Science in Information Technology (ICSITech)

Table of Contents

Innovation and practice in the teaching of digital media technology major 1 Song Jinyu, Zhang Xinyu

Classification Method of Multi-class on C4.5 Algorithm for Fish Diseases 5 Sucipto, Kusrini, Emha Luthfi Taufiq

Marker-Based Tracking Using Temporal Coherence in Computer Facial 10 Animation System Samuel Gandang Gunanto, Mochamad Hariadi, Eko Mulyanto Yuniarno

IT Governance and Business Alignment in Support of a Divestment Strategy 14 Annamaré Wolmarans, Neels Kruger, Neil Croft

Path Analysis Method to Identify Factors Affecting Consumer Interest on Online 20 Shopping Ratna Purwaningsih, Belan Adison

An Empirical Evaluation of ERP Values Using RBV Approach in Indonesia 26 Dwi Hastuti, Juhriyansyah Dalle, Husnul Khatimi

Virtual Player of Melodic Abstraction Instruments for Automatic Gamelan 30 Orchestra Khafiizh Hastuti, A. Zainul Fanani, Arry Maulana Syarif

Critical Success Factors for the Internet Technology Adoption by SMEs and Its 35 Impact for The Performance Aries Susanty, Diana Puspita Sari, Debby Anastasia

Energy Efficient Opportunistic Routing Algorithm for Underwater Sensor 41 Network: A Review Mohd Murtadha Mohamad, Mohammad Taghi Kheirabadi

A System to Diagnose Learning Disability in Children of Special Need 47 Munir, Rasim, Chepy Cahyadi, Lala Septem Riza

Push Notification System to Mobile Game Player Using Distributed Event-Based 52 System Approach Fiona Yunisa, Suharijto

Application of The Modified EzStego Algorithm for Hiding Secret Messages in 58 The Animated GIF Images Rinaldi Munir

2016 2nd International Conference on Science in Information Technology (ICSITech)

Distributed Infrastructure For Efficient Management Of Network Services. Case: 63 Large Company In Mining Sector In Colombia Leonel Hernández

Cloud Computing Sensitive Data Protection using Multi Layered Approach 69 Haifaa Jassim Muhasin, Rodziah Atan, Marzanah binti A.Jabar, Salfarina binti Abdullah

A New Framework for Measuring Volume of Axisymmetric Food Products using 74 Computer Vision System Based on Cubic Spline Interpolation Joko Siswantoro, Endah Asmawati

Antecedents of the Adoption of Online Games Technologies: The Study of 79 Adolescent Behavior in Playing Online Games Bernardinus Harnadi

Response Models for Series of Commands in Gaming Environment 85 Ida Bagus Kerthyayana Manuaba

Thai Text Topic Modeling System for Discovering Group Interests of Facebook 91 Young Adult Users Rachsuda Jiamthapthaksin

Profile of a typical mobile SMS user in emergency situations (empirical study in 97 an urban flood prone area) Dinar Mutiara Kusumo Nugraheni, Denise de Vries

Parallelized GA-PSO Algorithm for Solving Job Shop Scheduling Problem 103 Paulus Mudjihartono, Rachsuda Jiamthapthaksin, Thitipong Tanprasert

Model Assessment of Land Suitability Decision Making for Oil Palm Plantation 109 Hamdani, Anindita Septiarini, Dyna Marisa Khairina

Implementation of Moving Average and Soft Computing Algorithm to Support 114 Planting Season Calendar Forecasting System on Mobile Device Fhira Nhita, Deni Saepudin, Danang Triantoro, Adiwijaya, Untari Novia Wisesty

State-of-the-Art Vietnamese Word Segmentation 119 Song Nguyen Duc Cong, Quoc Hung Ngo, Rachsuda Jiamthapthaksin

Game Play Analytics to Measure the Effect of Marketing on Mobile Free-To-Play 125 Games Tuang Dheandhanoo, Sittichai Theppaitoon, Pisal Setthawong

The Determinants Affecting E-Loyalty: Hospitality Industry in Indonesia 131 Viany Utami Tjhin, Reza Tavakoli, Robertus Nugroho Perwiro Atmojo

Development of Instrumentation, Control and Navigation (ICON) for Anti Tank 137 Guided Missile (ATGM) Herma Yudhi Irwanto 2016 2nd International Conference on Science in Information Technology (ICSITech)

Web Based Fuzzy Expert System for Lung Cancer Diagnosis 142 Rodiah, Fitrianingsih, Herio Susanto, Emy Haryatmi

Location and Time Based Reminder System on Android Mobile Device 147 Nur Rokhman, Lubab Saifuddin

Smart Poster Implementation on Mobile Bulletin System using NFC Tags and Salt 152 Tokenization Case Study: Universitas Multimedia Nusantara Audy, Marcel Bonar Kristanda, Seng Hansun

User Difficulties in E-Learning System 158 Ramadiani, Rodziah Atan, Mohd Hasan Selamat, Rusli Abdullah, Noraini Che Pa, Azainil

Automated Tool for the Calculation of Cognitive Complexity of a Software 163 Dinuka Rukshani Wijendra, Kamalanath Priyantha Hewagamage

Implementation of the Cellular Automata Algorithm for Developing an 169 Educational Game Nurul Fauzia, Dedi Rohendi, Lala Septem Riza

SMS Authentication Code Generated by Advance Encryption Standard (AES) 256 175 bits Modification Algorithm and One Time Password (OTP) to Activate New Applicant Account Eddy Prasetyo Nugroho, Rizky Rachman Judhie Putra, Iman Muhamad Ramadhan

The Effect of Task Technology Fit Toward Individual Performance on the 181 Generation X (1956-1980) using Information Technology Putut Pamilih Widagdo, Ramadiani, Tony Dwi Susanto

UCPabc as an Integration Model for Software Cost Estimation 187 Renny Sari Dewi, Grandys Frieska Prassida, Sholiq, Apol Pribadi Subriadi

Integrated ANN And Bidirectional Improved PSO For Optimization Of Fertilizer 193 Dose On Palawija Plants Imam Cholissodin, Candra Dewi, Eunike Endariahna Surbakti

The Use of Triple Exponential Smoothing Method (Winter) in Forecasting 198 Passenger of PT Kereta Api Indonesia with Optimization Alpha, Beta, and Gamma Parameters Wawan Setiawan, Enjun Juniati, Ida Farida

PLAKDA - An IoT Platform for the Production of Mekong Basin Styled 203 Fermented Fish (Plara) Tuul Triyason, Pisal Setthawong

2016 2nd International Conference on Science in Information Technology (ICSITech)

Big Data Properties Designed for Customer Engagement Information via Multi- 209 Channel Digital Services Panant Krairojananan, Sakuna Anuvareepong

Agile Person Identification Through Personality Test and kNN Classification 215 Technique Rintaspon Bhannarai, Chartchai Doungsaard

Knowledge of Extraction from Trained Neural Network by Using Decision Tree 220 Soleh Ardiansyah, Mazlina Abdul Majid; Jasni Mohamad Zain

Investigation of PV Balancer Architectures on Practical Solar Photo Voltaic 226 System Dokala Udaykiran, P.V.R.L.Narasimham, N.Gouthamkumar and Darisi Sudheerkumar

Privacy and Security of Sharing Referral Medical Record for Health Care System 232 Mike Yuliana, Haryadi Amran Darwito, Amang Sudarsono, Gabymars Yofie

Implementation of Medical Error Prevention System for Hypertension Disease 238 Based on Fuzzy Reni Soelistijorini, Mike Yuliana, Ira Prasetyaningrum, Lina Pratiwi

Vehicle Detection and Tracking Based on Corner and Lines Adjacent Detection 244 Features M.D. Enjat Munajat, Dwi H. Widyantoro, Rinaldi Munir

Wireless Communication with Batching Method Based on Xbee-PRO S2B 250 Module for Sensing of Wind Speed Nurul Hiron, Asep Andang

A Wireless Sensor Networks Localization Using Geometric Triangulation Scheme 254 for Object Tracking in Urban Search and Rescue Application Prima Kristalina, Aries Pratiarso, Tessy Badriyah, Erik Dwi Putro

A Framework of Fuzzy Partition Based on Artificial Bee Colony for Categorical 260 Data Clustering Iwan Tri Riyadi Yanto, Dedy Hartama, Younes Saadi, Dewi Pramudi Ismi, Andri Pranolo

Comparison of SARIMA, NARX and BPNN Models in Forecasting Time Series 264 Data of Network Traffic Haviluddin, Nataniel Dengen

E-gov Readiness Assessment to Determine EGovernment Maturity Phase 270 Aji Supriyanto, Khabib Mustofa

A Proposed Method for Predicting US Presidential Election by Analyzing 276 Sentiment in Social Media Andy Januar Wicaksono, Suyoto, Pranowo 2016 2nd International Conference on Science in Information Technology (ICSITech)

Designing an Intelligent UI/UX System Based on the Cognitive Response for 281 Smart Senior You-Dong Yun, Chanhee Lee, Heui-Seok Lim

Dataset Feature Reduction Using Independent Component Analysis with Contrast 285 Function of Particle Swarm Optimization on Hyperspectral Image Classification Murinto, Agus Harjoko

A Survey on Data-Driven Approaches in Educational Games 291 Danial Hooshyar, Chanhee Lee, Heuiseok Lim

Comparison of Two Different Types of Morphological Method for Feature 296 Extraction of Retinal Vessels in Colour Fundus Images Hanung Adi Nugroho, Tri Lestari, Rezty Amalia Aras, Igi Ardiyanto

Measuring Quality of Service for Mobile Internet Services 300 Edy Budiman, Oki Wicaksono

Enhancing Modified Cuckoo Search Algorithm by using MCMC Random Walk 306 Noor Aida Husaini, Rozaida Ghazali, Iwan Tri Riyadi Yanto

Certificate Policy and Certification Practice Statement for Root CA Indonesia 312 Arfive Gandhi, Yudho Giri Sucahyo, Tomi Sirait

Dynamic Bandwidth Management Based on Traffic Prediction Using Deep Long 318 Short Term Memory Tjeng Wawan Cenggoro, Ida Siahaan

Automatic Generation of Content Security Policy to Mitigate Cross Site Scripting 324 Samer Attallah Mhana, Jamilah Binti Din, Rodziah Binti Atan

Enhancing E-Learning System to Support Learning Style Based Personalization 329 Kusuma Ayu Laksitowening, Amarilis Putri Yanuarifiani, Yanuar Firdaus Arie Wibowo

Modelling of Network Traffic Usage Using Self-Organizing Maps Techniques 334 Haviluddin, Arda Yunianta, Awang Harsa, Kridalaksana, Zainal Arifin, Bayu Kresnapati, Fauzi Rahman, Hendra Yuni Irawan, Achmad Fanany Onnilita Gaffar, Andri Pranolo

Soft Maximal Association Rule for Web User Mining 339 Iwan Tri Riyadi Yanto, Arif Rahman, Youes Saaadi

Car Detection Based on Road Direction on Traffic Surveillance Image 344 Adhi Prahara, Murinto

2016 2nd International Conference on Science in Information Technology (ICSITech)

The Assessment of Hospitality and Tourism SMEs Awareness on the Use of 350 Mobile Technology and Internet Services – A Case Study of Hotel Businesses in Thailand Sakuna Anuvareepong

Bias Aware Lexicon-Based Sentiment Analysis of Malay Dialect on Social Media 356 Data: A Study on The Sabah Language Mohd Hanafi Ahmad Hijazi, Lyndia Libin, Rayner Alfred, Frans Coenen

Segmentation of Optic Disc on Retinal Fundus Images Using Morphological 362 Reconstruction Enhancement and Active Contour Hanung Adi Nugroho, Ilcham, Abdul Jalil, Igi Ardiyanto

A New Approach on Prediction of Fever Disease by Using a Combination of 367 Dempster Shafer and Naïve Bayes Yani Mulyani, Eka Fitrajaya Rahman, Herbert, Lala Septem Riza

2016 2nd International Conference on Science in Information Technology (ICSITech) Antecedents of the Adoption of Online Games Technologies: The Study of Adolescent Behavior in Playing Online Games

Bernardinus Harnadi Department of Information System Soegijapranata Catholic University, Indonesia [email protected]

Abstract—This study has a purpose to investigate the Reference [3] conducted study on difference motivation of adoption of online games technologies among adolescents and online game player and mentioned that playing games are a their behavior in playing online games. The findings showed that sociable activity, a spent of time, a helping to develop useful half of them had experience ten months or less in playing online skills, an interesting, a worthwhile activity, an enjoyable games with ten hours or less for each time playing per week. activity, a lonely activity, a valuable activity, and excitement. Nearly fifty-four percent played up to five times each week where sixty-six percent played two hours or less. Behavioral Intention This study is a development from the main research [4] by has significant correlation to model variables naming Perceived the author. The main research investigated the adoption of Enjoyment, Flow Experience, Performance Expectancy, Effort online games technologies in Indonesia and used the Expectancy, Social Influence, and Facilitating Conditions; respondents in high school, college, and master degree in the Experience; and the number and duration of game sessions. The age range of 12-26. In this study, the respondents are last, Performance Expectancy and Facilitating Condition had a adolescent and adult. Because of the interesting findings of the positive, medium, and statistically direct effect on Behavioral main research, the author needs to conduct a new study in Intention. Four other variables Perceived Enjoyment, Flow factors influencing the adoption of online game technology Experience, Effort Expectancy, and Social Influence had positive among adolescents and their behavior in playing online game or negative, medium or small, and not statistically direct effect on using a part of data in the age range of 12-17 years and the Behavioral Intention. Additionally, Flow Experience and Social model developed by the main research. Influence have no significant different between the mean value for male and female. Other variables have significant different Many factors influenced on behavioral intention to play regard to gender, where mean value of male was significantly online games in adoption of online game technology from greater than female except for Age. Practical implications of this previous related studies. The main factors came from study are relevant to groups who have interest to enhance or to information technology, psychology, and economy science decrease the adoption of online games technologies. Those to including performance expectancy, effort expectancy, social enhance the adoption of online games technologies must: influence, facilitating condition, and the hedonic motivation: preserve Performance Expectancy and Facilitating Conditions; perceived enjoyment and flow experience. The two last factors enhance Flow Experience, Perceived Enjoyment, Effort are the interesting factors for adoption of online games Expectancy, and Social Influence; and engage the adolescent’s technology research because online games are technology for online games behavior, specifically supporting them in longer playing games and in enhancing their experience. The opposite entertainment purpose. This study has a purpose to examine actions to these proposed can be considered to decrease the the antecedents of the adoption of online games technologies adoption. among adolescents through investigating behavioral intention to play online game. Through collecting data, such as the Keywords—adoption technology; online game behavior; profile of respondent and analyzing the variables that affect adolescent the adoption of online games technologies, the prediction of human factors that affect an individual’s intention to adopt online gaming technologies can be reached and the adolescent I. INTRODUCTION behavior in playing online games can be investigated. To Online games are multiplayer games that can be played in achieve these goals, the study address two research questions, computers and mobile devices and can enable users to “How is adolescent behavior in playing online games?” and fantasize and be entertained, experience-oriented. Online “What factors are influencing the adoption of online game games are categorized as entertainment-oriented and Internet- technologies among adolescents”. based information technology [1] and the most players of online games are adolescents. They are differed from children II. PREVIOUS STUDIES AND HYPOTHESES and adult in their physic, cognitive, emotional, and social life that grow rapidly. Poole & Peyton [2] divide adolescents into This study uses theoretical model developed by [4] to two distinctive periods that are early (10-14) and late (15-19) examine factors predicted to be antecedents of the adoption adolescent. Capabilities and needs of them are differed from technology of online games among adolescents. The model children and adult. was developed by extending the Unified Theory of

978-1-5090-1721-8/16/$31.00 ©2016 IEEE 79 2016 2nd International Conference on Science in Information Technology (ICSITech)

Acceptance and Use of Technology (UTAUT) model by [5], Usefulness and Perceived Ease of Use was removed from the with two variables Perceived Enjoyment and Flow Experience model. These findings were in accordance with Venkatesh [5] which are searched from previous studies of online games. that proposed UTAUT model without attitude. Attitude had been covered by Performance Expectancy and Effort The related previous studies of online games employed the Expectancy. Technology Adoption Model (TAM) by [6], the Theory of Planned Behavior (TPB) by [7], Combining-TAM-TPB, and Reference [5] defined Social Influence and Facilitating UTAUT model to examine the antecedent of the adoption Conditions as the degree to which an individual perceives that technology of online games among online game players. other important people believe that they should use the system Through the investigation of the previous studies, two and the degree to which an individual believes that an variables Perceived Enjoyment and Flow Experience which organizational and technical infrastructure exists to support the have a strong impact on behavioral intention to play online use of the system respectively. games were added to the UTAUT model to propose new model. This study adopted theoretical model from the main Social influence had strong relation to user’s intention to research [4] that employs six hypotheses as shown in Table I. play online games as in [1], [8], [9], and [10]. Facilitating Fig. 1 shows the theoretical model used in the study. conditions also had direct relation on user’s intention to play online games as in [8].

TABLE I. RESEARCH HYPOTHESES

No. Hypothesis H1: Perceived Enjoyment has a significant direct effect on Behavioral Intention. H2: Flow Experience has a significant direct effect on Behavioral Intention. H3: Performance Expectancy has a significant direct effect on Behavioral Intention. H4: Effort Expectancy has a significant direct effect on Behavioral Intention. H5: Social Influence has a significant direct effect on Behavioral Intention. H6: Facilitating Conditions has a significant direct effect on Fig. 1. Theoretical Model Behavioral Intention.

III. METHOD Behavioral intention was the dependent variable in most of The study analyzed 366 respondents in age range of 12-17 studies of adoption technology. Reference [1] defined years out of 895 in the main research [4] that had passed the Behavioral intention as the extent to which the user intends to testing by a pilot study and some errors filtering. From 366 play online games in the future. Flow experience was defined data, seven (7) data were removed from the sample because of as the holistic experience that people feel when they act with out-of-range values in education variables. Consequently, the total involvement [1], [8], [9]. Meanwhile, Perceived final sample size was 359 and it sufficiently satisfied the Enjoyment was defined as the extent to which an individual minimum sample size as in [16]. perceives that playing online games is enjoyable [10]. The data was analyzed with SPSS software to get profile In the previous studies of online gaming, Flow Experience and characteristics of respondents and with SEM Amos to and Perceived Enjoyment were two variables that had examine the theoretical model and to get antecedents of significant relation to Behavioral intentions as in [1], [8], [9], adoption of online games technologies. The profile and [10], [11], [12], [13], and [14]. The other study on adoption characteristics that figured behavior of adolescents in this technology as in [15] had the same result about these relations. study were the practice and experience in playing online Performance Expectancy was defined as the degree to games. which an individual believes that using the system will help them to attain personal gains [5]. Reference [5] also defined IV. DATA ANALYSIS Effort Expectancy as the degree of ease associated with the use of the system. A. Descriptive Data Analysis The variables, Perceived Usefulness (Performance The analysis of the data from the response of questions in Expectancy) and Perceived Ease of Use (Effort Expectancy) the questionnaire was designed to produce: a profile of the had direct effect on Attitude as stated in [6]. The studies respondents; the type of games, the technologies used, and the conducted by [1] and [8] tried to link Perceived Usefulness to location; the number and duration of game sessions; the behavioral intention where the direct effect was not frequency and experience in playing online games; and the significant. When Attitude was removed from the model as correlation among the profile of respondent variables and stated in [9], Perceived Usefulness and Perceived Ease of Use variables in theoretical model. This analysis is expected to had direct effect on Behavioral Intention. Otherwise, Attitude reveal the behavior of adolescents in playing online games. had strong effect on Behavioral Intention while Perceived

80 2016 2nd International Conference on Science in Information Technology (ICSITech)

Profile of respondents regarding to age, education level, TABLE VIII. POPULAR GAMES FOR PLAYING ONLINE GAMES and gender are shown in Table II, III, and IV respectively. Popular Games * Frequency Most of them are female (61 percent), currently enrolled at Get Rich 60 senior high school (66 percent), and in the age of 17 years (40 Clash of Clans 57 percent). Counter Strike 20 Duel Otak 17 DotA 16 TABLE II. AGE DISTRIBUTION OF RESPONDENTS Hay Day 12 Point Blank 12 Age (Years) Frequency Percent * Popular games were defined as those that were identified by at least 10 participants as a game that they 12 28 7.8 had played recently. 13 56 15.6

14 37 10.3 15 43 12.0 The behavior regarding to the number and duration of 16 63 17.5 game sessions are shown in Table IX and X respectively. In 17 132 36.8 Table IX, half of respondents (54 percent) played up to 5 Total 359 100.0 times each week and almost one-third (30 percent) played 10 or more times per week. In Table X, two hours or less were TABLE III. EDUCATION LEVEL OF RESPONDENTS most playing sessions (66 percent) and the extreme session for Education Level Frequency Percent playing (5 hours or more) was done by 11 percent. Junior High School 121 33.7 Senior High School 238 66.3 TABLE IX. NUMBER OF GAME SESSIONS Total 359 100.0 Number of Times Frequency Percent Cumulative TABLE IV. GENDER OF RESPONDENTS Games Are Played Percent Each Week Gender Frequency Percent 1 time 39 10.9 10.9 Male 141 39.3 2 times 46 12.8 23.7 Female 218 60.7 3 times 39 10.9 34.5 Total 359 100.0 4 times 37 10.3 44.8 5 times 33 9.2 54.0 6 times 8 2.2 56.3 The technologies used, location, and types of game in 7 times 38 10.6 66.9 playing games are shown in Table V, VI, and VII respectively. 8 times 9 2.5 69.4 Most of respondents used mobile phone/tablet (67 percent) in 9 times 1 .3 69.6 playing online games; they were more comfortable in 10 or more times 109 30.4 100.0 home/friend home (91 percent) when playing online games; Total 359 100.0 and they were more often playing alone (46 percent). It is seen on Table VIII, Line Get Rich and Clash of Clans were the TABLE X. DURATION OF GAME SESSIONS most popular recently played online games played by 60 and Number of Hours Frequency Percent Cumulative 59 participants respectively. Each Time Games Percent Are Played Less than 1 hour 88 24.5 24.5 TABLE V. TECHNOLOGIES USED FOR PLAYING ONLINE GAMES 1 – 2 hours 150 41.8 66.3 Technology Used Frequency Percent 3 – 4 hours 81 22.6 88.9 Desktop PC 43 12.0 5 hours or more 40 11.1 100.0 Laptop/notebook 75 20.9 Total 359 100.0 Mobile phones/tablets 241 67.1 Total 359 100.0 The number of hours spent playing games each week and the months of experience in playing games are shown in TABLE VI. LOCATION FOR PLAYING ONLINE GAMES Tables XI and XII respectively. In Table XI, half of the Location Frequency Percent respondents (54 percent) played for 10 hours or less per week. Home/friends home 327 91.1 One-quarter (27 percent) played for 6 to 10 hours per week School 7 1.9 and the other 27 percent played 1 to 5 hours per week. In Net Cafe/game center 25 7.0 Table XII, half of respondents (50 percent) experienced 10 Total 359 100.0 months or less and 40 percent experienced 17 months or more. TABLE VII. TYPES OF GAME FOR PLAYING ONLINE GAMES The differences between the mean values of variables for Type of Game Frequency Percent males and females are shown in Table XIII. It is seen that for Single player 164 45.7 two variables Flow Experience and Social influence, there Multi players 123 34.3 were no significant difference between the mean value for Massively Multi players 72 20.1 males and females (p < 0.05). The other variables show that Total 359 100.0 there were significant difference between them with the mean for males was significantly greater than the mean for females

81 2016 2nd International Conference on Science in Information Technology (ICSITech) except for Age. For Age, the mean for males was significantly (H/W). All of the profile variables also have significant lower than the mean for females. correlation (p < 0.05) to Age (A) and Experience (E).

TABLE XI. FREQUENCY OF GAME PLAYING TABLE XIII. DIFFERENCES BETWEEN MALES AND FEMALES

Number of Hours per Frequency Percent Cumulative Levene’s Test for ) Week Playing Games Percent Equality of ) 1-5 95 26.5 26.5 Variable Variances t Mean Mean 2-tailed

6-10 98 27.2 53.8 Statistical Females ( (Males) – Statistical F ( 11-15 28 7.8 61.6 Significance Significance 16-20 57 15.8 77.4 Age 12.421 .000 -4.713 .000 -.887 21-25 7 1.9 79.4 Experience 4.904 .027 6.180 26-30 12 3.3 82.7 .000 4.413 Number of Times Games 31-35 4 1.1 83.8 .571 .450 4.542 Are Played Each Week .000 1.605 36-40 31 8.7 92.5 Number of Hours Each 41-45 5 14 93.9 18.181 .000 6.213 .000 1.041 Time Games Are Played 46-50 1 .3 94.2 Number of Hours per 51-55 0 0 94.2 13.097 .000 5.809 .000 9.877 Week Playing Games 56-60 21 5.8 100.0 Flow Experience .138 .711 2.617 .009 .24084 Total 359 100.0 Perceived Enjoyment .005 .945 5.075 .000 .34407 Performance Expectancy .248 .619 3.479 .001 .30816 TABLE XII. EXPERIENCE OF GAME PLAYING Effort Expectancy .393 .531 4.992 .000 .36999 Months of Experience in Frequency Percent Cumulative Social Influence .117 .732 .971 .332 .06516 Playing Games Percent Facilitating Conditions .189 .664 5.587 .000 .40193 Less than or equal to 1 month 56 15.6 15.6 Behavioral Intention 12.011 .001 4.357 .000 .30370 2-4 months 64 17.8 33.4 Notes: For Levene’s test variances are assumed to be equal if and only if the statistical significance is 5-7 months 42 11.7 45.1 0.05 or greater. 8-10 months 17 4.7 49.9 11-13 months 25 7.0 56.8 The three of the profile variables T, H, and H/W have 14-16 months 11 3.1 59.9 17 months or more 144 40.1 100.0 significant correlation (p < 0.05) to all model variables except Total 359 100.0 to Social Influence (SI). EDU has significant correlation (p < 0.05) to all of model variables except to Flow Experience (FE), Social Influence, and Behavioral Intention (BI). Age has Table XIV presents the correlations among profile significant correlation (p < 0.05) to all of model variables variables, among model variables, and between profile except to Social Influence and Behavioral Intention. variables and model variables. Furthermore, among dependent variable Behavioral Intention to other variables does the Experience has significant correlation (p < 0.05) to all of statistically significant correlation (p < 0.05) as described by model variables except to Social influence and Flow [17]. Experience. The last, all of independent variables in the theoretical model and profile variables have significant From the Table XIV, it is seen there are significant positive correlation (p < 0.05) to dependent variable correlation (p < 0.05) among the profile variables naming Behavioral Intention except to Education Level and Age. Education Level (EDU), Number of Times Games Are Played Each Week (T), Number of Hour Each Time Games Are Played (H), and Number of Hour per Week Playing Games

TABLE XIV. CORRELATIONS AMONG VARIABLES Profile Variable Model Variable Variable EDU T H H/W A E FE PCE PE EE SI FC Education Level (EDU) 1 Number of Times Games Are Played Each Week(T) -.143 1

Number of Hours Each Time Games Are Played (H) -.146 .262 1

Number of Hours per Week Playing Games (H/W) -.150 .701 .796 1 Profile Age (A) .900 -.154 -.194 -.179 1 Experience (E) -.199 .321 .410 .427 -.206 1

Flow Experience (FE) -.083 .180 .257 .226 -.105 .101 1 Perceived Enjoyment (PCE) -.153 .308 .349 .365 -.179 .316 .291 1 Performance Expectancy (PE) -.160 .228 .268 .280 -.162 .219 .094 .425 1 Effort Expectancy (EE) -.231 .262 .276 .279 -.267 .256 .248 .457 .335 1 Social Influence (SI) .000 .000 .001 -.055 .036 -.018 .000 .099 .362 .096 1 Facilitating Conditions (FC) -.159 .271 .358 .363 -.205 .392 .169 .475 .316 .456 .100 1 Model Variable Behavioral Intention (BI) -.014 .264 .291 .328 -.034 .246 .195 .421 .399 .287 .108 .422 Notes: Correlation coefficients in bold type are statistically significant (p < 0.05).

82 2016 2nd International Conference on Science in Information Technology (ICSITech)

TABLE XVI. INTERPRETATION OF MODEL FIT STATISTICS B. Statistically Model Analysis Model Fit Statistics Interpretations The analysis of the model used AMOS software and the Small values of χ2 with p > 0.05 Model Chi-Square χ2 results of the SEM analysis are shown in Fig. 2. The results indicate at least a reasonable fit. are the direct causal effect and it was presented in two χ2/df (Normed Chi-square, NC) Values of 0 < NC < 5 are considered to formats. Firstly, the unstandardized effect and the statistical where df is the degrees of freedom indicate at least a reasonable model fit. significant of the unstandardized effect in series using *, **, RMR values close to 0 indicate a good and *** to show statistical significance at a level of 0.05, 0.01, RMR (Root Mean Square Residual) model fit. The fit gets worse as the and 0.001, severally. Otherwise, NS was used to show no value of RMR increases. statistically significant at a level of 0.05 or less. Secondly, the GFI = 1 means a perfect fit, GFI > 0.9 number in parentheses present the standardized effect and an GFI (Goodness of Fit Index) means a good fit, GFI = 0 indicates a interpretation of the magnitude of its, the magnitude as AGFI (Adjusted GFI) poor fit. AGFI corrects GFI downward described by [18] is Small (S) when it is less than 0.1 and based on model complexity NFI (Normed Fit Index) NFI, IFI, CFI should have values > 0.9 Medium (M) while it is 0.1 to less than 0.5. IFI (Incremental Fit Index) to indicate a good model fit. The result in Fig. 2 shows that Performance Expectancy CFI (Comparative Fit Index) RMSEA ≤ 0.05 means a close fit; and Facilitating Conditions had a positive, medium, and RMSEA (Root Mean Square Error of between 0.05 and 0.08 means a statistically direct effect on Behavioral Intention. The other Approximation) reasonable fit, 0.1 or more indicates a variables naming Perceived Enjoyment, Flow Experience, poor fit. Effort Expectancy, and Social Influence had a positive or negative, medium or small, and not statistically significant at a V. FINDINGS AND DISCUSSION level of 0.05 or less. A. Adolescent Behavior in Playing Online game It is clear that only hypotheses H3 and H6 are fully supported, meaning there were a statistically significant direct The analysis of data in this study shows that EDU and Age causal effect at a level of 0.05 or less between the two had sufficient negative correlation to Experience and a spent independent variables and Behavioral Intention as in the result of time in playing online games (T, H, and H/W). It means in Fig.2 and the two variables had also a statistically that early adolescent in junior high school consumed more significant correlation (p < 0.05) as in the result in Table VI. time and had more experience in playing online games than The other hypotheses (H1, H2, H4, and H5) are partially late adolescent in senior high school. supported, meaning there was a statistically significant It is quite surprisingly that a spent of time in playing online correlation (p < 0.05) between the four independent variables games had significant positive correlation to all variables in and Behavioral Intention although the variables had no theoretical model except to Social Influence. It means that the statistically significant direct causal effect at a level of 0.05 or more time the adolescent playing online games, the more they less. will: involve in gaming; find more enjoyable in gaming; have a stronger belief that using gaming systems will help them to attain personal gains; find easier to use the gaming systems; have a stronger belief that there is organizational and technical infrastructure to support use of gaming systems; and have a

stronger intention to use gaming systems in the future.

Comparing to late adolescent, the early one is: more experienced in gaming; more time consuming in playing game; more involved in gaming; more enjoyable in gaming; stronger belief that using gaming systems will help them to attain personal gains; easier to use the gaming systems; and stronger belief that there is organizational and technical Fig. 2. The Result of Analysis of Theoretical Model infrastructure to support the use of gaming systems. Table XVI is recommended by [17] to assess the fit of the Comparing to adolescent females, the males are: more theoretical model and their interpretations. From Table XV experienced in gaming; more time consuming in playing and XVI, the values of the fit statistics for analysis of the game; more enjoyable in gaming; stronger belief that using theoretical model and the results have very satisfactory fit gaming systems will help them to attain personal gains; easier statistics. to use the gaming systems; stronger belief that there is organizational and technical infrastructure to support the use of gaming systems; and stronger intention to use gaming TABLE XV. FIT STATISTICS FOR THE THEORETICAL MODEL systems in the future. 2 Model N NC (χ /df) RMR GFI AGFI NFI IFI CFIRMSEA Online game users especially adolescent can draw the 389.252/168 = Theoretical .042 .906 .871 .976 .899 .939 .061 895 2.317 benefits from the results of the study. They can use the Model R2: BI (33 percent) findings regarding to their behaviors in playing online games Note: R2 is the proportion of the variance of the variable Behavioral Intention that is explained by the to better adjust their time for playing games, keep doing their variables affecting it. study, and keep having social interaction with others.

83 2016 2nd International Conference on Science in Information Technology (ICSITech)

B. The antecedent of Adoption of Online Game Technology provides the BPPLN scholarship including the support from among Adolescent Soegijapranata Catholic University, Indonesia and From the analysis of theoretical model, it is indicated that Assumption University, Thailand. all of dependent variables have significant correlation to Behavioral Intention. The findings are accordance to the REFERENCES results of the previous studies, although not all of dependent [1] C. L. Hsu and H. P. Lu, “Why do people play on-line games? An variables have statistically direct effect to Behavioral extended TAM with social influences and flow experience,” Information Intention. From the descriptive data analysis, it is also & management, vol. 41, pp. 853–868, 2004. indicated that Experience (E) and a spent of time of adolescent [2] E. S. Poole and T. Peyton, “Interaction design research with adolescents: playing online games (T, H, and H/W) have significant Methodological challenges and best practices,” IDC'13, pp. 211-217, correlation to Behavioral Intention. 2013. [3] T. Hainey, T. Connolly, M. Stansfield, and E. Boyle, “The differences in motivations of online game players and offline game players: A C. Implications and Future Research combined analysis of three studies at higher education level,” Computers From theoretical perspective the research findings & education vol. 57, pp. 2197–2211, 2011. confirmed the previous studies in online games. The [4] B. Harnadi, “An investigation of the adoption of online game technologies in Indonesia,” International Journal of Gaming and adolescent behavior in playing online games is not reported in Computer-Mediated Simulations, vol.8, no. 4, article 2, 2016. previous studies and it reveals new findings in this study. [5] V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, “User Practical implications of findings are relevant to acceptance of information technology: toward a Unified View,” MIS Quarterly, vol. 27, no. 3, pp. 425–479, 2003. government, parents, teachers, and groups of people who have [6] F. D. Davis, “Perceived Usefulness, Perceived Ease of Use, and User interest on factors that influence the adolescent’s intention to Acceptance of Information Technology,” MIS Quarterly, vol. 13, pp. play online games and their behavior. The group who has 319–340, 1989. interest to enhance adoption of online games technologies [7] I. Ajzen, “The theory of planned behavior,” Organizational Behavior among adolescents must: preserve factors having strong and Human Decision Processes, vol. 50, no.2, pp. 179–211, 1991. influence to their intention, Performance Expectancy and [8] M. C. Lee, “Understanding the behavioural intention to play online Facilitating Conditions; enhance factors naming Flow games,” Online information review, vol. 33, no. 5, pp. 849–872, 2009. Experience, Perceived Enjoyment, Effort Expectancy, and [9] L. Fan, C. G. Ghu, Y. H. Suh, and S. C. Lee, “How to attract Chinese Social Influence; and engage the their behavior regard to play online game users,” Asian journal on quality, vol. 13, no. 1, pp. 7–21, online games. 2012. [10] P. Chaitaneeyachat, “The adoption of online game technologies in Regarding to differences behaviors in playing online Thailand,” doctoral dissertation in Information Technology, Assumption games among adolescents, their intention to play online games University, 2012. may be enhanced to female and late adolescent. The adoption [11] Y. Gao, “Appeal of online computer games: a user perspective,” The can also be enhanced through; supporting them in longer Electronic library, vol. 22, no. 1, pp. 74–78, 2004. playing games and enhancing their experience. Decreasing [12] H. Y. Wang and Y. S. Wang, “Gender differences in the perception and acceptance of online games,” British journal of educational technology, their intention to play online games can be considered through vol. 39, no. 5, pp. 787–806, 2008. the opposite actions to those proposed. [13] D. M. Koo, “The moderating role of locus of control on the links This study explores the adolescent’s behavior regarding to between experiential motives and intention to play online games,” play online games through examining factors which influences Computers in human behavior, vol. 25, no. 2, pp. 466–474, 2009. [14] P. S. Wei and H. P. Lu, “Why do people play mobile social games? An their intention in playing online games in the future. This examination of network externalities and of uses and gratifications,” study implies weak external validity regard to the first study of Internet research, vol. 24, no. 3, pp. 313–331, 2014. online games conducted in Indonesia. The repeating studies [15] H. Nysveen, P.E. Pedersen, and H. Thorbjørnsen, “Explaining intention will be required to enhance the validity of the study. to use mobile chat services: moderating effects of gender,” Journal of Consumer marketing, vol. 22, no. 5, pp. 247–256, 2005. The future research may expand other behavioral factors [16] G. D. Israel, Determining Sample Size. IFAS Extension, University of naming habit and hedonic motivation stated in UTAUT2 Florida, 2015. [Online]. Available: https://edis.ifas.ufl.edu/pd006. model by [19]. Social Influence and Flow Experience, weak [Accessed: 22- August- 2015] factors in this study, may be investigated in further research to [17] R. B. Kline, Principles and Practice of Structural Equation Modeling get comparable result with this study. (3nd ed). London: Guilford Press, 2011. [18] J. Cohen, Statistical power analysis for the behavioral sciences (2nd ed.). New York, NY: Academic Press, 1988. ACKNOWLEDGMENT [19] V. Venkatesh, J. Y. L. Thong, & X. Xu, “Extending the Unified Theory The author gratefully acknowledges the Directorate of of Acceptance and Use of Technology”, MIS Quarterly, vol. 36, no. 1, Higher Education, Ministry of Research, Technology and pp. 157–178, 2012. Higher Education of the Republic of Indonesia, which

84